Ask Question
7 September, 00:15

Consider a program to accept and tabulate votes in an election. Who might want to attack the program? What types of harm might they want to cause? What kinds of vulnerabilities might they exploit to cause harm?

+4
Answers (1)
  1. 7 September, 03:40
    0
    Who might want to attack the program to accept and tabulate votes in an election?

    The political opponents.

    What types of harm might they want to cause?

    A silent interception; an interruption a modification and a fabrication

    What kinds of vulnerabilities might they exploit to cause harm?

    The assets vulnerablities.

    Explanation:

    Political opponents might want to attack the program to accept and tabulate votes in an election to modify factual results to show them as the winners.

    The harm they might want to cause is cheating the elections by copying the program, data files or wiretapping; to get the system lost, or get it unavailable or unusable with the factual data in the large dams and disable the power grids and modify the values accordingly adding the forged results.
Know the Answer?
Not Sure About the Answer?
Get an answer to your question ✅ “Consider a program to accept and tabulate votes in an election. Who might want to attack the program? What types of harm might they want to ...” in 📙 Computers & Technology if there is no answer or all answers are wrong, use a search bar and try to find the answer among similar questions.
Search for Other Answers