CMPT 100 Lecture Notes - Scareware, New Media Artist, Waterfall Model

34 views2 pages

Document Summary

Without user involvement, you may find users who sabotage the process of delivery. Software expertise: look for engineers that know a lot about building software. It is also important to recognize that software has a life cycle. The waterfall model comes the closest to standard engineering models for building physical artifices. It obviously takes great skill to be a software engineer. Young hackers of the 70s and 80s have grown into adults : movies maintain this perception, kevin mitnick"s conviction in 1989 at the age of 17. Have these hackers stopped exploring, or have they become even more skilled and experienced: some are now security consultants . Most it attacks originate in north america: perception fuelled by popular nigerian money letter scams, 96% of attacks originate from north america. There are fewer attacks: not true! 2011-03-10: programs that could damage your data. Worms: self-activate and exploit known vulnerabilities in systems to travel across the network.