Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Chapter 13 #5

Merged
merged 9 commits into from
Nov 22, 2022
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
Add Chapter 13 Exercises
  • Loading branch information
Kayzels committed Nov 22, 2022
commit 956417897250745d99a5e2de843bf096d1b70469
1 change: 1 addition & 0 deletions .vscode/ltex.dictionary.en-GB.txt
Original file line number Diff line number Diff line change
Expand Up @@ -8,3 +8,4 @@ diphenylethers
EPEAT
OLAP
POPI
shill
17 changes: 17 additions & 0 deletions units/part05/chapter13.tex
Original file line number Diff line number Diff line change
Expand Up @@ -215,5 +215,22 @@
A code that states the principles and core values that are essential to a set of people and, therefore, govern their behaviour.
\end{definition}

\pagebreak
\section{Exercises}
\begin{exercise}{Self-Assessment}
\begin{enumerate}
\item Fooling someone into giving you their password is called \concept{social engineering}.
\item Another name for a zombie network is \concept{botnet}.
\item \concept{Antivirus} software runs in the background, protecting your computer from infected files.
\item \concept{Software pirates} are people who illegally duplicate software.
\item A \concept{shill} is a slang term for someone paid by a company to make them look good, and make you a victim of a scam.
\item \concept{Public Key Infrastructure} allows you to send information securely through a public network.
\item \concept{Biometrics} involves identifying you from your physical traits.
\item An \concept{Intrusion Detection System} watches for people illegally using a company's network.
\item You work email account is legally accessible only by you. \concept{False}.
\item Under the \concept{Right to be forgotten}, an individual can ask for certain webpages to be removed from the results of web searches.
\end{enumerate}
\end{exercise}

\vbox{\rulechapterend}
\end{document}