1. What are the three security properties of information called and how could they be described?
2. What would be the differences between requirements and controls in a security process?
3. How does a buffer overflow allow an attacker to take over a computer?
4. Morris Worm gives an example for #3 above, but are there any other examples?