- Explain briefly what is meant by each of the following terms, and give an example in each case: (a) Denial of Service attack (b) Trojan Horse (c) Buffer Overflow
- If you were a system administrator, what advice would you give users regarding the selection of passwords?
- You have been asked to advise someone who manages a small business with five desktop PCs and one server machine providing access to shared files, access to printers and a web server. The office has a broadband Internet connection. What would your Top 10 security guidelines for this person.
- Why do organisations need to have a security policy?
- In the context of IT security, what do the following terms mean? (a) Threat (b) Attack (c) Vulnerability (d) Risk management
- Authentication is one of six standard security services. List and briefly discuss the five other standard security services. In the case of each of the 6 services, give an example of why it is needed. In the case of each of the six services, give one security mechanism or technology that helps to provide that service. 0l>