8.8. Exercises

1:In what ways is denial of service (lack of availability for authorized users) a vulnerability to users of single-user personal computers?
2:Identify the three most probable threats to a personal computing system in an office with fewer than ten employees. That is, identify the three vulnerabilities most likely to be exploited. Estimate the number of times each vulnerability is exploited per year; justify your estimate.
3:Perform the analysis of Exercise 2 for a personal computing system located in a large research laboratory.
4:Perform the analysis of Exercise 2 for a personal computing system located in the library of a major university.
5:List three factors that should be considered when developing a security plan.
6:State a security ...

Get Security in Computing, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.