Final Project
Threat Factors Computers as Targets
⦁ Differentiate between viruses, worms, and Trojan horses.
⦁ Explain the threat viruses pose to computers and computer users.
⦁ Explain the threat worms pose to computers and computer users.
⦁ Explain the threat Trojan horses pose to computers and computer users.
⦁ Describe countermeasures to threats that target computers and mobile devices.