Consider a program that allows a surgeon in one city to assist in an operation on a patient in another city via an internet connection. Who might want to attack the program? What type of harm might they want to cause? What kind of vulnerabilities might they exploit to cause harm? Could those vulnerabilities also cause harm in the absence of an active, malicious, attacker?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here