Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Networks | 2 |
Computer Security | 2 |
Computer Software | 2 |
Information Technology | 2 |
Prevention | 2 |
Risk Management | 2 |
Computer Science Education | 1 |
Crime | 1 |
Disk Drives | 1 |
Floppy Disks | 1 |
Higher Education | 1 |
More ▼ |
Source
Journal of Cybersecurity… | 1 |
Author
Chou, Te-Shun | 1 |
Hempenius, Nicholas | 1 |
Keating, Joseph, Comp. | 1 |
Ponder, Tim, Comp. | 1 |
Ropog, Marty, Comp. | 1 |
Publication Type
Journal Articles | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Ponder, Tim, Comp.; Ropog, Marty, Comp.; Keating, Joseph, Comp. – 1997
This document provides general information on computer viruses, how to help protect a computer network from them, measures to take if a computer becomes infected. Highlights include the origins of computer viruses; virus contraction; a description of some common virus types (File Virus, Boot Sector/Partition Table Viruses, Trojan Horses, and…
Descriptors: Computer Networks, Computer Security, Computer Software, Disk Drives