Distinguish among vulnerability, threat and control
Confidentiality Integrity and availability of data
moodificatiob,interruption interception and fabrication . Explain substitution ciphers Computer criminals definition of malicious code and explain different types of malicious codes Explain in detail RSA ,AES algorithm Name any two vulnerabilities and explain their effects short notes on the following. i) Code red ii) Brain virus