Lecture Information systems security - Chapter 2: Identifying potential risks
Lecture Information systems security - Chapter 2: Identifying potential risks
After studying this chapter you should be able to differentiate among various systems’ security threats: Privilege escalation, virus, Worm, Trojan, Spyware, Spam, Adware, Rootkits, Botnets, Logic bomb,... For further information, inviting you to refer lecture.