You are on page 1of 1

Distinguish among vulnerability, threat and control

Confidentiality Integrity and availability of data


moodificatiob,interruption interception and fabrication .
Explain substitution ciphers
Computer criminals
definition of malicious code and explain different types of malicious codes
Explain in detail RSA ,AES algorithm
Name any two vulnerabilities and explain their effects
short notes on the following.
i) Code red ii) Brain virus

You might also like