Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
3 Cards in this Set
- Front
- Back
SEC 280 Principles of Information Systems Security Case Studies |
SEC 280 Principles of Information Systems Security Case Studies SEC 280 Week 1: Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the company. Write a brief description of what they are, and include your assessment of whether the activities are something to worry about or not. This assignment requires two to three pages, based upon the APA style of writing. |
|
SEC 280 Principles of Information Systems Security Case Studies SEC 280 Week 1: Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the company. Write a brief description of what they are, and include your assessment of whether the activities are something to worry about or not. This assignment requires two to three pages, based upon the APA style of writing. |
SEC 280 Principles of Information Systems Security Case Studies |
|
SEC 280 Principles of Information Systems Security Case Studies |
SEC 280 Principles of Information Systems Security Case Studies SEC 280 Week 1: Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the company. Write a brief description of what they are, and include your assessment of whether the activities are something to worry about or not. This assignment requires two to three pages, based upon the APA style of writing. |