APCCE - Life Skill Course - Information and Communication Technology - Module 3.1
Contents: Overview of Internet Security E-Mail Threats and Secure E-Mail Viruses and Antivirus Software Firewalls Cryptography Digital Signatures References: William Stallings and Lawrie Brown, Computer Security Principles and Practice, 3rd Edition, Pearson. Mandava V. Basaveswara Rao and Ch. Naga Manisha. (2008). “Failures of network security utilities”, Oriental Journal of Computer Science and Technology, Vol. 1 No.1, pp. 81-88 https://antivirus.comodo.com/blog/computer-safety/what-is-virus-and-its-definition/ Amit Kumar, Sejal Srivastava, Vridhi Wadhawan and Indu Khatri, Cryptography and Its Components, International Journal for Technological Research in Engineering, Vol. 7, Issue 4, 2019, Pg. No. 6314-6316. Wikipedia contributors. (2022, June 4). HTTPS. In Wikipedia, The Free Encyclopedia. Retrieved 12:59, June 8, 2022, from https://en.wikipedia.org/w/index.php?title=HTTPS&oldid=1091506014. Wikipedia contributors. (2022, May 9). Hacker. In Wikipedia, The Free Encyclopedia. Retrieved 13:35, June 8, 2022, from https://en.wikipedia.org/w/index.php?title=Hacker&oldid=1087018331. Wikipedia contributors. (2022, June 7). Digital signature. In Wikipedia, The Free Encyclopedia. Retrieved 14:33, June 8, 2022, from https://en.wikipedia.org/w/index.php?title=Digital_signature&oldid=1091952316. Resources: https://pixabay.com/sound-effects/ https://tunetank.com/track/1458-power https://tunetank.com/track/3957-such-things