This preview shows page 1. Sign up to view the full content.
Unformatted text preview: Use a taxonomy to show the relationship of a) operators, programmers, internal staff, external staff and outsider against b) information theft, masquerading, abuse and pest programs. <chapter 2 slides 30-36 OR 2009 Test solution> 4. What is the difference between Trojan Horses and Virus? What is self reproducing program and how to write a virus program? <chapter 2 slides 47,48,51 and 53-55 >...
View Full Document
This note was uploaded on 01/11/2012 for the course EE EE4215 taught by Professor Drcheng during the Winter '11 term at City University of Hong Kong.
- Winter '11