answersLogoWhite

0


Best Answer

Considering that the USB is hardware and not software its harder to lock it down . The IT dept can put stuff into place that will prevent end users from using the USB ports. Is it possible that anyone can do that, yes. If the computer is left unlocked anyone can pretty much do anything from the USB port, plant virus, logic bombs and the like. As I stated before the IT dept can put stuff into place that will prevent anything like that from happening. most do not though

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Do you agree with the defense lawyer's argument that anyone could have planted the logic bomb because UBS's computer security had considerable holes?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Why do computer viruses affect computers?

A virus can be sneaky and mostly the reason why a virus hacks your computer is because they want you to buy their product .About 4 months ago i had a computer virus on my computer called security tool it wanted me to buy there security .Another reason why is because they just want to annoy you or just damage your computer.


Will imvu give you a virsus with a internet security?

yes it will my computer is messed up because of it


What is the relationship between MULTICS project and the early development of computer security?

Because MULTICS is the first OS to integrate security into its core functions


What is the relationship between the MULTICS project and the early development of computer security?

Because MULTICS is the first OS to integrate security into its core functions


Did Alan turning invent the first Altair computer?

No, Turing died in the 1950s of cyanide poisoning shortly after the british government pulled all his security clearances because he was believed to be a security risk because he was homosexual. The Altair computer did not come out until 1974.


Why exactly is IP security needed?

The reason why IP or Internet Protocol security is needed is because if anyone knows your IP address they would be able to hack your computer if there were no IP security.


Which gives better security workgroup sharing or homegroup sharing?

A workgroup has more security. A homegroup provides less security than a workgroup because any user of any computer in the homegroup can access homegroup resources.


Is a convoluted argument simple?

no, because the argument is all rolled together


What is an argument from design?

An argument from design is a theological term for a teleological argument - an argument for the existence of God, such that because nature is orderly, it is evidence of a designer.


In terms of computer security what is the security access control needed for?

Security access control limits what a user can see, use or access within a network. This is important because it restricts the ability to access data to those who are authorized to work with it.


Is peer to peer communications a security issue or copyright issue?

P2P is both a security issue (personal and computer security) and because so much intellectual property is uploaded illegally on p2p networks it is also a copyright issue.


Why is the Security light on in a 2001 Chevy Blazer that doesn't even have a security system?

The 2001 Chevy Blazer does have an ignition security system that is controlled by the computer in the vehicle. The light might come on because of an error that is coming up in the computer due to a key problem or an ignition problem. This is a common issue with the 2000 and 2001 Blazer.