Learn about some of the most dangerous ways people can exploit the Internet's vulnerabilities, including DDoS attacks (which flood websites with connection requests), "Trojans" (malware hidden inside an innocent piece of information), and "botnets" (which control computers like puppets). Then, investigate some common defense mechanisms that help pinpoint and capture these threats.
Of Viruses, Botnets, and Logic Bombs
[San Francisco, California, USA] : Kanopy Streaming, 2015.
Title from title frames.; In Process Record.
Features: Paul Rosenzweig The University of Chicago Law School
Originally produced by The Teaching Company/The Great Courses in 2013.
Mode of access: World Wide Web.