Unformatted text preview: Use a taxonomy to show the relationship of a) operators, programmers, internal staff, external staff and outsider against b) information theft, masquerading, abuse and pest programs. <chapter 2 slides 30-36 OR 2009 Test solution> 4. What is the difference between Trojan Horses and Virus? What is self reproducing program and how to write a virus program? <chapter 2 slides 47,48,51 and 53-55 >...
View Full Document
- Winter '11
- Computer Security, Security engineering, Computer insecurity