SEC 270 Security of Computers and Their Data
3 hours
Methods that have been used in the past to steal with the aid of the computer will be examined. Case studies will be used. Methods of detecting computer fraud and physically protecting the computer and EDP systems will be stressed.
Cross Listed Courses
CSCI 270