Ask Question

Consider a program to accept and tabulate votes in an election. Who might want to attack the program? What types of harm might they want to cause? What kinds of vulnerabilities might they exploit to cause harm?

+3
Answers (1)
  1. 2 October, 21:07
    0
    Who might want to attack the program to accept and tabulate votes in an election?

    The political opponents.

    What types of harm might they want to cause?

    A silent interception; an interruption a modification and a fabrication

    What kinds of vulnerabilities might they exploit to cause harm?

    The assets vulnerablities.

    Explanation:

    Political opponents might want to attack the program to accept and tabulate votes in an election to modify factual results to show them as the winners.

    The harm they might want to cause is cheating the elections by copying the program, data files or wiretapping; to get the system lost, or get it unavailable or unusable with the factual data in the large dams and disable the power grids and modify the values accordingly adding the forged results.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “Consider a program to accept and tabulate votes in an election. Who might want to attack the program? What types of harm might they want to ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers