Discuss the vulnerabilities associated with the internet


1. Discuss the vulnerabilities associated with the Internet and wireless networks.

2. What is malware? Distinguish between a virus, a worm, a Trojan horse, and SQLinjection attacks.

3. What is a computer crime? Define the following terms: hacker, cybervandalism,denial-of-service attack, and botnet.

4. Describe each of the following government regulations as they pertain to the issueof security: HIPAA, Gramm-Leach-Bliley Act, and Sarbanes-Oxley Act.

5. What is the purpose of a risk assessment? What is a security policy? What is an acceptable use policy?

6. Discuss the difference between disaster recovery planning and business continuityplanning.

7. What is authentication? Describe the following authentication technologies:tokens, smart cards, and biometrics.

8. Describe the roles of firewalls, intrusion detection systems, and antivirus software in promoting security.

9. What is encryption? How does Secure sockets Layer (SSL) differ from Secure Hypertext Transfer Protocol (S-HTTP)?

10. What problem does public key encryption solve and how does it work? What is adigital certificate?

Request for Solution File

Ask an Expert for Answer!!
Operation Management: Discuss the vulnerabilities associated with the internet
Reference No:- TGS01379355

Expected delivery within 24 Hours