EE4215_t1 - 5 What are most popular ways of securing our...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
EE4215 Tutorial 1 1. Why we need computer security? 2. How we can secure our computer information via access violation? 3. How we can impose threats to computer systems? 4. What are the common ways of infringing computer security?
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 5. What are most popular ways of securing our computers? 6. How many ways to prevent computer crime? 7. What are pest programs? State difference worms and virus....
View Full Document

This note was uploaded on 01/11/2012 for the course EE EE4215 taught by Professor Drcheng during the Winter '11 term at City University of Hong Kong.

Ask a homework question - tutors are online