Patel Gunjan Term Paper 1 100429069

Patel Gunjan Term Paper 1 100429069 - TABLE OF CONTENTS

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: TABLE OF CONTENTS Introduction.....................................................................................................................................2 Viruses and Worms..........................................................................................................................2 Wireless Communication.................................................................................................................3 Usage Portals...................................................................................................................................3 Scammers.........................................................................................................................................4 E-mail...............................................................................................................................................4 Remote Access.................................................................................................................................5 Online Banking................................................................................................................................5 Web Pages........................................................................................................................................6 Trojan Horses...................................................................................................................................7 Cyber Terrorist.................................................................................................................................7 Propaganda......................................................................................................................................8 Iraqi War, 2003................................................................................................................................9 Defence Precautions........................................................................................................................9 Firewall............................................................................................................................................9 Virus Scanners...............................................................................................................................10 Future Trends.................................................................................................................................11 Conclusion.....................................................................................................................................11 Reference.......................................................................................................................................13 Introduction In the modern era, we are very dependent on information technology (IT). In current businesses, a short disruption of the internet could lead to problems. Lots of information is being communicated over the net at daily basis. In the fast pace world of the 21communicated over the net at daily basis....
View Full Document

This note was uploaded on 03/11/2012 for the course LSDHFA 234 taught by Professor Sdaf during the Spring '12 term at UOIT.

Page1 / 12

Patel Gunjan Term Paper 1 100429069 - TABLE OF CONTENTS

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online