Through your coursework, you will learn how to

In past projects, students have had the opportunity to

Hoaxes commonly show the following common characteristics:



The major vendors of anti-virus software all havea webpage with computer security advisories,the latest threats by malicious programs,as well as detailed technical documents about each malicious program.

This program can help prepare you for the following certification exams:

Related requirements for the major:



Some of the more serious Trojan horses allow a hacker to remotely control the victim's computer, perhaps to collect passwords and credit card numbers and send them to the hacker, or perhaps to launch denial of service attacks on websites.

The bachelor's degree in computer science requires 41 credits of minor and/or elective coursework.

Double majors: You can earn a dual major upon completion of all requirements for both majors, including the required minimum number of credits for each major and all related requirements for both majors. The same class cannot be used to fulfill requirements for more than one major. Certain restrictions (including use of credit and acceptable combinations of majors) apply for double majors. You cannot major in two programs with excessive overlap of required coursework. Contact an admissions advisor before selecting a double major.

Experts in computer security, who are  attorneys,speak of "information warfare".


Computer Science Bachelor's Degree

He pled guilty and was placed on probation fortwo years, was ordered to provide 250 hours of community service,and forfeited all of the computer equipment used during his criminalactivity.

This is enticement for you to spread the hoax.



In March 1997, a young hacker disabled the telephone serviceat the Worcester, Massachusetts airport for six hours,which disabled the air-traffic control system and other critical services.

Unauthorized changing of data is generally a fraudulent act.

The point made in that essay is that, out of approximately 61000malicious programs for the Microsoft Windows operating system,there have been arrests and convictions of the author(s) of malicious programs:

Computer Science Bachelor's Degree

This time he was sentenced to 21 months in prison,followed by two years of "supervised release"during which time he was forbidden to eitherown or use any computer for his personal use.

This is called a denial of service () attack.

1990),, 967 F.2d 561 (11thCir. 1992).
Riggs was first convicted in 1986 for his unauthorized use ofa computer and was sentenced to a mere 15 days of community serviceand placed on probation for 18 months.

Type: Academic clubAvailable To: Undergraduate and Graduate

(Fulfills the general education requirement in upper-level advanced writing.) Prerequisite: WRTG 101 or WRTG 101S. Recommended: WRTG 291 or WRTG 293. A comprehensive, project-based study of applied technical writing. The aim is to design and develop appropriate and effective technical documents using strategies and technologies for a variety of audiences. Students may receive credit for only one of the following courses: COMM 393/393X, ENGL 393/393X, or WRTG 393/393X.

There are many different versions, most of which share key phrases.

(Fulfills the general education requirement in communications.) Prerequisite: WRTG 101 or WRTG 101S. An overview of professional writing. The goal is to analyze professional communication scenarios to develop effective workplace writing. Topics include the standards, conventions, and technologies of professional writing; communicating to a variety of audiences; and developing appropriate written responses to workplace challenges. Students may receive credit for only one of the following courses: COMM 293, ENGL 293, or WRTG 293.