Reference no: EM133267310
Assignment:
1- Mention how you can put a business case in such a way that it has a contrast with faith, fear and fact based on demonstrations.
2- Mention the four phases of the SDLC life cycle.
3- Mention the three best components of system designs considering the SDLC.
4- Mention the 4 types of maintenance systems.
5- Mention 2 types of software licenses. Describe and explain them.
6- Say that it is a computer crime, and exemplify the types of computer crime by means of examples.
7- Compare the differences between contrast hackers vs crackers.
8- Say it is malware and mention examples.
9- Say the difference between cyberwar and cyberterrorism.
10- Describe in an exemplary way the process of managing IS security.