This preview shows page 1. Sign up to view the full content.
Unformatted text preview: Use a taxonomy to show the relationship of a) operators, programmers, internal staff, external staff and outsider against b) information theft, masquerading, abuse and pest programs. 4. What is the difference between Trojan Horses and Virus? What is self reproducing program and how to write a virus program?...
View Full Document
- Winter '11