1. Discuss cybercrimes including creation of malicious programs such as viruses, worms, Trojan horses, and zombies as well as denial of service attacks, Internet scams, identity theft, cyberbullying, rogue Wi-Fi hotspots, and data manipulation. (10) 2. Identify ways to safeguard computer against each of the following risk viruses, worms, Trojan horses, botnets, denial of service attacks, back doors and spoofing (10)
Comments
Leave a comment