How would you distinguish between a hacktivist
and a cyberterrorist? Should the use of hacktivists
by a country against enemy organizations be
considered an act of war? Why or why not? How
about the use of cyberterrorists?
374:
What is the difference between a risk assessment
and an IT security audit?
Identify three commonly used antivirus software
packages. Develop a spreadsheet that compares
the cost and fundamental features of each package. Which antivirus solution would you choose
and why?