Q1. Describe the common program threats in detail.
Q2. In brief explain the worms and viruses in terms of system threats.
Q3. Write down a detail note on the Signature based detection and anomaly detection.
Q4. In brief explain the system call monitoring.
Q5. What do you mean by encryption? In brief describe the different encryption methods for data security.
Q6. Describe the process management in the Linux all along with the system calls used.