Consider a program to display on your website your city’s current time and temperature.
Who might want to attack your program?
What is any hacker who wants to wreak havoc?
Consider a program that allows consumers to order products from the web.
Who might want to attack the program?
What is Black hat hacker who’s working for financial gain or to wreak havoc?
Consider a program to accept and tabulate votes in an election.
Who might want to attack the program?
What is anyone who is voting in the election may want to attack the program?
Consider a program that allows a surgeon in one city to assist in an operation on a patient in another city via an Internet connection.
Who might want to attack the program?
What is people who may want to attack the program:
someone who dislikes the patient, someone who dislikes the doctor, any person that is just looking to do something bad?
What was the first mobile phone with a touch screen?
What is the IBM Simon?
Consider a program to display on your website your city’s current time and temperature.
What types of harm might they want to cause?
What is change the date/time to mess with users of the site and to damage the credibility of the site?
(answers could differ)
Consider a program that allows consumers to order products from the web.
What types of harm might they want to cause?
What is bring he website/steal information of customers and either sell it or use it themselves?
Consider a program to accept and tabulate votes in an election.
What types of harm might they want to cause?
What is people voting for one candidate may want to increase the votes for their selection and decrease the votes of the opposing candidate. The candidates themselves may also want to attack the program and change the outcome of the election to ensure that they win and their opponent(s) lose?
Consider a program that allows a surgeon in one city to assist in an operation on a patient in another city via an Internet connection.
What types of harm might they want to cause?
What is someone who dislikes the patient may want to tell the doctor to do something wrong that would harm the patient?
Someone who dislikes the doctor may do the same thing to make the doctor look bad and make it look like he made a terrible mistake?
What year was the first computer made?
What is 1943?
Consider a program to display on your website your city’s current time and temperature.
What kinds of vulnerabilities might they exploit to cause harm?
What is a backdoor, weak security system?
Consider a program that allows consumers to order products from the web.
What kinds of vulnerabilities might they exploit to cause harm?
What is a backdoor, weak security system?
Consider a program to accept and tabulate votes in an election.
What kinds of vulnerabilties might they exploit to cause harm?
What is if the program’s security is weak, they might exploit this vulnerability and tamper with the votes?
Consider a program that allows a surgeon in one city to assist in an operation on a patient in another city via an Internet connection.
What kinds of vulnerabilities might they exploit to cause harm?
What is if the program’s security is weak, they might exploit this vulnerability and send fake messages or suggestions?
Who made the first computer?
Who is Charles Babbage?