Consider how a hacker might trick people Into giving him their user IDs and passwords to their Amazon. COM accounts.
What are some of the ways that a hacker might accomplish this? What crimes can be performed with such information? [10] 2. Some companies prefer not to have disaster recovery plans. Under what circumstances does this make sense? Discuss. 3.
A body scan at airports created a big debate. Debate both points of this issue and relate It to CE security. 4..
Your site has been hacked.List two organizations where you would report his incident so that they can alert other sites. How do you do this, and what type of Information do you have to 1 . Consider how a hacker might trick people into giving him their user IDs and 3.
A body scan at airports created a big debate. Debate both points of this Issue and this Incident so that they can alert other sites. How do you do this, and what type of information do you have to 1 information do you have to provide? [5] 2. Some companies prefer not to have disaster recovery plans.
Under what relate it to CE security.