Review CHPT 8 - Review Questions 8-1 through 8-4 1 Why are information systems vulnerable to destruction error and abuse a List and describe the most

Review CHPT 8 - Review Questions 8-1 through 8-4 1 Why are...

This preview shows page 1 - 3 out of 6 pages.

Review Questions 8-1 through 8-4 1.Why are information systems vulnerable to destruction, error, and abuse?a.List and describe the most common threats against contemporary information systems. b.Define malware and distinguish among a virus, a worm, and a Trojan horse. c.Define a hacker and explain how hackers create security problems and damage systems. d.Define computer crime. Provide two examples of crime in which computers are targets and two examples in which computers are used as instruments of crime.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture