ISSC361 Week 2
Question Description
I’m working on a other discussion question and need the explanation and answer to help me learn.
- Give reasons why a user would protect a file from read or write access by other users and provide examples how this can be done.
- Explain the difference between a virus, a worm, and a Trojan.
- Explain why it is safer for administrators to use two different accounts when working with a computer. Explain the difference between the two accounts.
- Explain how access restrictions on a folder or directory can block a useràaccess to a file, even if the file itself may be readable by that user.
- Explain the four general tasks that may play a role in recovering from a security incident.
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."