ecurity and make unauthorized use of an asset. Vulnerability: A weakness in the system which was leftover while designing the system     Explain each violation in detail with its types and examp

Information Technology Project Management
9th Edition
ISBN:9781337101356
Author:Kathy Schwalbe
Publisher:Kathy Schwalbe
Chapter11: Project Risk Management
Section: Chapter Questions
Problem 9QQ
icon
Related questions
Question

System security can be threatened via any of following violations:

Threat (program vs. system) : A program which has the potential to cause serious damage to the system.

Attack: An attempt to break security and make unauthorized use of an asset.

Vulnerability: A weakness in the system which was leftover while designing the system    

Explain each violation in detail with its types and examples (use diagram/figure).

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Security Techniques and tools
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Information Technology Project Management
Information Technology Project Management
Computer Science
ISBN:
9781337101356
Author:
Kathy Schwalbe
Publisher:
Cengage Learning
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,