Securing Information Systems

Assess why information systems are vulnerable to destruction error and abuse. Examine the various types of
threats including malicious software, hackers and computer crime, internal threats, and software vulnerability.