EE4215_t1 - 5 What are most popular ways of securing our...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
EE4215 Tutorial 1 1. Why we need computer security? 2. How we can secure our computer information via access violation? 3. How we can impose threats to computer systems? 4. What are the common ways of infringing computer security?
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 5. What are most popular ways of securing our computers? 6. How many ways to prevent computer crime? 7. What are pest programs? State difference worms and virus....
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online