Number 18
Number 19
Number 20
Number 21
Fun Facts
100

Consider a program to display on your website your city’s current time and temperature. 

Who might want to attack your program?

What is any hacker who wants to wreak havoc?

100

Consider a program that allows consumers to order products from the web.

Who might want to attack the program?

What is Black hat hacker who’s working for financial gain or to wreak havoc?

100

Consider a program to accept and tabulate votes in an election.

Who might want to attack the program?


What is anyone who is voting in the election may want to attack the program?

100

Consider a program that allows a surgeon in one city to assist in an operation on a patient in another city via an Internet connection.

Who might want to attack the program? 

What is people who may want to attack the program: 

someone who dislikes the patient, someone who dislikes the doctor, any person that is just looking to do something bad?

100

What was the first mobile phone with a touch screen?

What is the IBM Simon?

200

Consider a program to display on your website your city’s current time and temperature.

What types of harm might they want to cause?

What is change the date/time to mess with users of the site and to damage the credibility of the site?

(answers could differ)

200

Consider a program that allows consumers to order products from the web.

What types of harm might they want to cause?

What is bring he website/steal information of customers and either sell it or use it themselves? 

200

Consider a program to accept and tabulate votes in an election.

 What types of harm might they want to cause?

What is people voting for one candidate may want to increase the votes for their selection and decrease the votes of the opposing candidate. The candidates themselves may also want to attack the program and change the outcome of the election to ensure that they win and their opponent(s) lose?

200

Consider a program that allows a surgeon in one city to assist in an operation on a patient in another city via an Internet connection.

 What types of harm might they want to cause?

What is someone who dislikes the patient may want to tell the doctor to do something wrong that would harm the patient?

Someone who dislikes the doctor may do the same thing to make the doctor look bad and make it look like he made a terrible mistake?

200

What year was the first computer made?

What is 1943?

300

Consider a program to display on your website your city’s current time and temperature. 

What kinds of vulnerabilities might they exploit to cause harm?

What is a backdoor, weak security system?

300

Consider a program that allows consumers to order products from the web.

What kinds of vulnerabilities might they exploit to cause harm?

What is a backdoor, weak security system?

300

Consider a program to accept and tabulate votes in an election.

What kinds of vulnerabilties might they exploit to cause harm?

What is if the program’s security is weak, they might exploit this vulnerability and tamper with the votes?

300

Consider a program that allows a surgeon in one city to assist in an operation on a patient in another city via an Internet connection.

 What kinds of vulnerabilities might they exploit to cause harm?

What is if the program’s security is weak, they might exploit this vulnerability and send fake messages or suggestions?

300

Who made the first computer?

Who is Charles Babbage?