CSC 379 SUM2008:Topics: Difference between revisions
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
'''commerce/anticompetitive/instant''' | '''commerce/anticompetitive/instant''' | ||
Most of the references on this page are three or four years old. The issue is | Most of the references on this page are three or four years old. The issue is whether a small number of companies should unfairly dominate the market for instant messaging. Update the existing page with new references, and the study guide with new issues. | ||
whether a small number of companies should unfairly dominate the market for | |||
instant messaging. Update the existing page with new references, and the study | |||
guide with new issues. | |||
{| cellpadding="4" | {| cellpadding="4" | ||
|- | |- | ||
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/ Current Main | | [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/ Current Main Page] | ||
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/study.php Current Study Guide] | |||
Page] | |||
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/study.php | |||
Current Study Guide] | |||
|} | |} | ||
Line 24: | Line 14: | ||
'''risks/security/precautions''' | '''risks/security/precautions''' | ||
What security precautions do web and network administrators need to take to | What security precautions do web and network administrators need to take to guard against hacker attacks, such as distributed denial-of-service attacks? What precautions are needed against other forms of hacking? Against cyberwarfare and terrorist threats? Update topic page and study guide to cover current/future precautions related to recent occurrences. | ||
guard against hacker attacks, such as distributed denial-of-service attacks? | |||
What precautions are needed against other forms of hacking? Against | |||
cyberwarfare and terrorist threats? Update topic page and study guide to cover | |||
current/future precautions related to recent occurrences. | |||
topic. If you would like to make a new page focused on social engineering, you | '''Social Engineering''' should be included as a major section within this topic. If you would like to make a new page focused on social engineering, you may if you choose this topic. | ||
may if you choose this topic. | |||
{| cellpadding="4" | {| cellpadding="4" | ||
|- | |- | ||
| [http://ethics.csc.ncsu.edu/risks/security/precautions Current Main Page] | | [http://ethics.csc.ncsu.edu/risks/security/precautions Current Main Page] | ||
| [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php Current | | [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php Current Study Guide] | ||
Study Guide] | |||
|} | |} |
Revision as of 10:22, 16 July 2008
Instant Messaging
commerce/anticompetitive/instant
Most of the references on this page are three or four years old. The issue is whether a small number of companies should unfairly dominate the market for instant messaging. Update the existing page with new references, and the study guide with new issues.
Current Main Page | Current Study Guide |
Security Precautions
risks/security/precautions
What security precautions do web and network administrators need to take to guard against hacker attacks, such as distributed denial-of-service attacks? What precautions are needed against other forms of hacking? Against cyberwarfare and terrorist threats? Update topic page and study guide to cover current/future precautions related to recent occurrences.
Social Engineering should be included as a major section within this topic. If you would like to make a new page focused on social engineering, you may if you choose this topic.
Current Main Page | Current Study Guide |