Warning:
JavaScript is turned OFF. None of the links on this page will work until it is reactivated.
If you need help turning JavaScript On, click here.
The Concept Map you are trying to access has information related to:
readings second level, email has helped the efficiency of the workplace to an amazing level, but it also has a few thorns. while the circulation of a confidential document (or even a document meant for internal use only) could have been resonably controlled in the days pre-email, today's systems can spread a document around the world in the time it takes to click a mouse. corporations today have to avoid making an easy misstep that could end up costing them millions of dollars., the readings i have reviewed, cryptography is a field most commonly known about in movies that talk about 'shady government agencies' such as the nsa that are always snooping around. the truth is, we need agencies like the nsa to crack the codes of our nation's enemies, either internal or external, so we can put an end to any attempts to attack our country., are you the weak link? the article discussed how hackers are enterig the systems of corporations not through the default method of the computer line, but rather through the time-honored technique of smooth talking new or unwitting employees, the code red worm was discussed in an article that also talked about the cyberwarfare between the united states and china. this occured over the forced landing of a us navy intelligence plane by chinese mig fighters. this article displayed how things could get out of hand.