Unformatted text preview: Use a taxonomy to show the relationship of a) operators, programmers, internal staff, external staff and outsider against b) information theft, masquerading, abuse and pest programs. 4. What is the difference between Trojan Horses and Virus? What is self reproducing program and how to write a virus program?...
View Full Document
- Winter '11
- Computer Security, Security engineering, Computer insecurity, threat tree, System Security Engineer