IT 240 WEEK 8 CHECKPOINT THREAT CATEGORIZATION
Checkpoint Threat Categorization a. Resource “Local Area Network” and Response to Discussion Question 1 from Week 7 b. Due Date Day 5 – Post to Assignments thread in Individual Forum c. Define each of the following terms in your own words i. Boot sector ii. File iii. Multipartite iv. Macro v. Trojan horse vi. Email worms vii. Instant messaging worms viii. IRC worms ix. File-sharing networks worms x. Internet worms d. Explain how each virus or worm functions and spreads. e. Determine in which category the threat you researched in Week Seven belongs. Your response must be between 200 and 300 words. f. Review Assignment and File Submission format instructions, page 7 of Syllabus.
Checkpoint Threat Categorization a. Resource “Local Area Network” and Response to Discussion Question 1 from Week 7 b. Due Date Day 5 – Post to Assignments thread in Individual Forum c. Define each of the following terms in your own words i. Boot sector ii. File iii. Multipartite iv. Macro v. Trojan horse vi. Email worms vii. Instant messaging worms viii. IRC worms ix. File-sharing networks worms x. Internet worms d. Explain how each virus or worm functions and spreads. e. Determine in which category the threat you researched in Week Seven belongs. Your response must be between 200 and 300 words. f. Review Assignment and File Submission format instructions, page 7 of Syllabus.
- No tags were found...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.