In: Computer Science
6. Information warfare, denial of service, and system tampering
are classified under ____________ threat category.
7. Computer abuse, fraud and theft, falsification, planting of
malicious code, and sale of personal information are classified
under _______________ threat category.
8. Economic exploitation, information theft, and intrusion of
personal privacy are classified under ______________ threat
category.
9. Accurate _________________ is the first step towards
accomplishing proper planning and accurate budgeting for software
development projects.
10. There are ________ major types of cost estimation techniques
available today.
The answers are:
6. Information Security Threats, Information warfare, denial of service, and system tampering are classified under _____Information Security Threats_______ threat category, as all these belong to information security threats.
7. Cybercrime threat, Computer abuse, fraud and theft, falsification, planting of malicious code, and sale of personal information are classified under ________Cybercrime _______ threat category., as these are cybercrimes.
8. Information security threat, Economic exploitation, information theft, and intrusion of personal privacy are classified under _______Information security_______ threat category, as these are related to information security of an individual.
9. Project Planning, Accurate ____Project_Planning____________ is the first step towards accomplishing proper planning and accurate budgeting for software development projects, as planning of the project is an important task.
10. Four, There are _four_______ major types of cost estimation techniques available today, the four techniques are:
-------------------------------------------Please Upvote-------------------------------------------------------------------------------------