Threat Factors—Computers as Targets
- Differentiate between viruses, worms, and Trojan horses.
- Explain the threat viruses pose to computers and computer users.
- Explain the threat worms pose to computers and computer users.
- Explain the threat Trojan horses pose to computers and computer users.
- Describe countermeasures to threats that target computers and mobile devices.