07.08.2015 Views

IT 240 WEEK 8 CHECKPOINT THREAT CATEGORIZATION

Checkpoint Threat Categorization a. Resource “Local Area Network” and Response to Discussion Question 1 from Week 7 b. Due Date Day 5 – Post to Assignments thread in Individual Forum c. Define each of the following terms in your own words i. Boot sector ii. File iii. Multipartite iv. Macro v. Trojan horse vi. Email worms vii. Instant messaging worms viii. IRC worms ix. File-sharing networks worms x. Internet worms d. Explain how each virus or worm functions and spreads. e. Determine in which category the threat you researched in Week Seven belongs. Your response must be between 200 and 300 words. f. Review Assignment and File Submission format instructions, page 7 of Syllabus.

Checkpoint Threat Categorization a. Resource “Local Area Network” and Response to Discussion Question 1 from Week 7 b. Due Date Day 5 – Post to Assignments thread in Individual Forum c. Define each of the following terms in your own words i. Boot sector ii. File iii. Multipartite iv. Macro v. Trojan horse vi. Email worms vii. Instant messaging worms viii. IRC worms ix. File-sharing networks worms x. Internet worms d. Explain how each virus or worm functions and spreads. e. Determine in which category the threat you researched in Week Seven belongs. Your response must be between 200 and 300 words. f. Review Assignment and File Submission format instructions, page 7 of Syllabus.

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!