Q1. Define security, threat, exposure and vulnerability in relation to Information Systems security. Identify which components of a computer based information system must be protected by the information system security. (200 words)
Q2. Explain malware and the 3 major categories of software attacks. Include definitions of a logic bomb, back door, denial of service attack and distributed denial of service attack. (200 words)
Q3. Define and discuss the major categories of information security controls. Provide 2 examples of each. (200 words)
Q4. Define a business continuity plan contrasting a cold, warm and hot site. (200 words)