CTEC 111 Computer Science Definitions
- Explain how viruses, worms, and Trojan horses spread
- Discuss typical forms of malicious software and understand how they work
- Discuss the many ways that anyone can protect their computer from virus infection.
- Discuss the procedures involved in developing an organizational policy.
- Define following:
Software Exploitation,Viruses, worms, Trojan horses,Spyware - Discuss the different types of encryption method and how to implement them.
Summary:You need write of summary of chapter 2 and make sure it is 100% percent your own.
Chapter 3:
Part2: Grade (5 points)
- Explain encryption methods and how they are used
- Describe authentication methods and how they are used
- Explain and configure IP Security
- Discuss attacks on encryption and authentication methods
- Discuss the importance of security token.