Question :
Use a search engine to find the names of five different cyber viruses.
Using WORD, write a short paragraph on each.
Use your own words .
Read Chapter 5 of the Easttom text, Malware
Text Book :
Easttom, Chuck. Computer Security Fundamentals, (Third Edition). Indianapolis: Pearson, 2016. ISBN-13: 978-0-7897-5746-3
Primary topics:
————————–
Video. What happens when you date hackers to hack you.
Click HERE to watch or click embedded video below.
— PPT Attached.