4. Search the World Wide Web for job descriptions of project managers. You can use any number of Web
sites, including www.monster.com or www.dice.com, to find at least ten IT-related job descriptions. What
common elements do you find among the job descrip
1. What does CISSP stand for? Use the Internet to identify the ethical rules CISSP holders have
agreed to follow.
CISSP stands for Certified Information Systems Security Professional
You can find this at https:/www.isc2.org/cissp/default.aspx
2. For what
Pg.35 3. Consider the information stored on your personal computer. For each of the terms listed, find
an example and document it: threat, threat agent, vulnerability, exposure, risk, attack, and exploit.
Threat Hacker, a Threat is a person(s) that intend
Running head: KEVIN MITNICK
Stevens Henager ISS310
Kevin Mitnick was once the worlds most wanted cybercriminal. He started off as a very
adapt Phreaker (Hacker over the phone) which led him into s