Problem
1) Define computer crime and list several examples of computer crime. Contrast hackers versus crackers.
2) Define malware and give several examples.
3) Define and contrast cyberwar and cyberterrorism.
4) Describe several methods for preventing and/or managing the spread of computer viruses.
5) Describe the process of managing IS security.