This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: addition, they also will give you the option on payment to keep your subscription. The downside is that many internet criminals will devise viruses just for these programs. The program that James borrowed was missing a couple of things. First it was missing a encryption for the wireless network. This would have prevented James’ access in the first place. The next thing they forgot to protect their important bank information. This could have been done by clearing cache in the computer or even putting them in a password protected file. The most important information in this day in age is securing your information when you buy products online. I think that I approach online security very aggressively to protect my information. However if I had a program to track down the email fishers and bust them I would defiantly use it. Resources None Used...
View Full Document
This note was uploaded on 09/10/2010 for the course CJS AAAF0PR0P7 taught by Professor Jones during the Spring '10 term at University of Phoenix.
- Spring '10