Security- Chapter 9
- Describe the importance of back-up and recovery plans.
-
Why is physical access restriction the only way to guarantee the security of a computer system?
- Argue for and against an employer's right to read an employee's email stored on a company-owned computer, i.e. look at both sides of the issue.
- Define the following:
- Hacking
- Biometric Access Systems
- Encryption
- Firewall
- Private-key encryption
- Public-key encryption
- Computer Sabotage
- Botnet
- Maleware
- Virus
- Worm
- Trojan Horse
- Denial of Service Attacks
- Identity theft
- Phishing
- Pharming
- Cyberbullying
- Discuss email privacy.
Last modified 9/12/2017