April 6th, 2019 📆 | 1873 Views ⚑
Dr. Soper discusses identification and authentication issues in the context of computer security. Topics covered include controlled access, impersonation, authentication
April 2nd, 2019 📆 | 5374 Views ⚑
Dr. Soper discusses firewalls and network security. Topics covered include network vulnerabilities, port scanning, network segmentation, firewall security policies, the
April 1st, 2019 📆 | 2263 Views ⚑
Dr. Soper discusses software program security. Topics covered include incomplete mediation, race conditions, time-of-check to time-of-use vulnerabilities, backdoors, intentional and
March 28th, 2019 📆 | 3318 Views ⚑
Dr. Soper provides an introduction to computer security. Topics covered include dependence on technology, information assets, threats, vulnerabilities, controls, confidentiality,
October 2nd, 2013 📆 | 4042 Views ⚑
Dr. Soper discusses illicit data interception and illicit data access in the context of information security. Topics covered include man-in-the-middle
September 23rd, 2013 📆 | 3744 Views ⚑
Dr. Soper discusses malware in the context of information security. Topics covered include viruses, worms, Trojan horses, zombies, logic bombs,
September 5th, 2013 📆 | 5044 Views ⚑
Comments