with data and system privacy and security. In the case, Bob Smith, a senior MIS student, in an exchange with his professor, Dr. Mel Carnahan, receives a challenge “If you can get past my firewall and get to my printer to print your homework, I’ll not only bring it to class to show them, but I’ll buy you dinner.” This challenge is the foundation for the rest of the case, which reviews the methods Bob uses to attempt to gain access to Dr. Carnahan’s printer. Once Bob exhausts all the technical methods…
Words 925 - Pages 4