CST 109 - Computer and Malware History
This course explores the history of the personal computer industry, and relates the evolution of computers with that of networking and the emergence of malicious code, Internet attacks, and identity theft. The relationship between all three is explored in depth so that the student has a clear understanding of the environment in which they will be performing additional study and eventually, actual work activities.
3 Class Hours
1. Examine the history and development of various computing architectures.
2. Explore the advances in Intel microprocessor architecture and its impact on operating system power and vulnerability.
3. Study the progression of malicious code and its spread through computer networks, including the world wide web.
Learning Outcomes of the Course:
Upon successful completion of this course the student will be able to:
1. Describe the evolution of the Intel microprocessor family and its relationship to the evolution of malicious code.
2. Understand how the power of the personal computer is related to the microprocessor used inside it.
3. Explain how the emergence of networking and the world-wide-web led to many of the computer security issues facing us today.
4. Explain how microprocessor technology, computer networking, and operating system vulnerabilities all combine to enable the evolution and spread of malicious code.
5. Describe how computers and the Internet combine to enable identity theft and other illegal activities.
[Add to Portfolio]