CMWKEI – Communication Theory Research
September 16, 2020
the tools and concepts learned in the course and in previous business courses to develop
September 16, 2020

CTEC 111 Computer Science Definitions

  1. Explain how viruses, worms, and Trojan horses spread
  2. Discuss typical forms of malicious software and understand how they work
  3. Discuss the many ways that anyone can protect their computer from virus infection.
  4. Discuss the procedures involved in developing an organizational policy.
  • Define following:
    Software Exploitation,Viruses, worms, Trojan horses,Spyware
  • Discuss the different types of encryption method and how to implement them.

Summary:You need write of summary of chapter 2 and make sure it is 100% percent your own.

Chapter 3:

Part2: Grade (5 points)

  1. Explain encryption methods and how they are used
  2. Describe authentication methods and how they are used
  3. Explain and configure IP Security
  4. Discuss attacks on encryption and authentication methods
  1. Discuss the importance of security token.
 

"Is this question part of your assignment? We Can Help!"