What is information security? How does it differ from network security?
What are the three components of the C.I.A. triad?
How does a threat to information security differ from an attack?
List the vectors
that malicious code uses to infe
ct or compromise other systems.
What are the various types of malware? How do worms differ from viruses? Do Trojan horses carry
viruses or worms?
What is the difference between an exploit and vulnerability?
What are the types of password attacks?
What is the difference between a denial
service attack and a distributed denial
Which is potentially more dangerous and devastating? Why?
For a sniffer attack to succeed, what
must the attacker do? How can an attacker gain access to a network
to use the sniffer system?
Include your name and period in the subject area of the email.