Description
Case Study1: Hacking and invading the computer
Please describe a case that has been in the news recently and describe what harm can be done by the unlawful intrusion into the computer of another.
Case study2
Research the most current ways to prevent identity computer theft. List the pro’s and con’s of the one you feel would be the most effective.