CCSI 360 HOMEWORK 03 FA 07 - CCSI 360 Student Name...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
CCSI 360 Computer Ethics HW 3  Student Name Section  V   Instructor Due Date  Part 1 2 3 4 Total Maximum  Points 25  points 25  points 25  points 25  points 100  points Your Score    Textbook Reading Assignment   Read Chapter(s) 3 in your Computer Ethics  textbook. Part 1 Glossary Terms - Computer and Internet Crime Define, in detail, each of these glossary terms from the realm of computer ethics, computer science  and computer topics, in general.  If applicable, use examples to support your definitions.  Consult your  notes or course textbook(s) as references or the Internet by visiting Web sites such as:      (a) honeypot A decoy computer server that gives hackers fake information about a network in order to confuse them  and log their activity. (b) ingress filtering A process by which Internet service providers prevent incoming packets with false IP addresses from  being passed on (c) logic bomb A type of Trojan horse that executes under specific conditions (d) zero - day attack An attack that occurs before the security community or a software developer knows about the vulnerability  or has been able to repair it (e) zombie Computers that are taken over by a hacker during a denial-of-service attack and directed to send 
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 07/07/2008 for the course CCSI 360 taught by Professor Papademas during the Spring '08 term at DeVry Chicago.

Page1 / 4

CCSI 360 HOMEWORK 03 FA 07 - CCSI 360 Student Name...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online