Details
- Look up “the paper that started the study of computer security.” Prepare a summary of the key points. What in this paper specifically addresses security in areas previously unexamined?
- Consider the information stored on your personal computer. For each of the terms listed, find an example and document it: threat, threat agent, vulnerability, exposure, risk, attack, and exploit.
- Using the web, find out who Kevin Mitnick was. What did he do? Who caught him? Write a short summary of his activities and why he is famous.
Reviews
There are no reviews yet.