Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Exam 2 Review
Unit 5
Chapter 6
Chapter 7
Keylogger Ransomware
Firewall Backdoor
Pharming Trojan
Phishing Worm vs. Virus
Address Spoofing Virus Signature
Social Engineering Quarantined File
TLS Rootkit
Malware Dictionary vs. Bruteforce Attack
Evil Twin Authentication Protocol
Man-in-the-Middle Cryptographic Key/Algorithm
Spyware Encryption vs. Decryption
Adware Plaintext vs. Ciphertext
Port Scan Digital Certificate
Bot/Botnet
Chapter 8
Confidentiality Computer Generations
Code of Ethics 1G
Information Technology 2G
Computer Science 3G
Software Engineer 4G
Systems Analyst Transistor
Computer Operator Vacuum Tube
Network Administrator Moore’s Law
Database Administrator Disruptive Technology
Computer Programmer Offshoring vs. Outsourcing
Security Specialist Dot-Coms
CIO