1. To create a relationship between two tables, the attributes that define the primary key in one table must appear as attributes in another table, where they are referred to as a foreign key.
2. The two commands that SQL provides for managing access rights are ALLOW and FORBID.
3. Whether you work in a commercial or government setting, a general rule applies within the workplace: employees should have no expectation of privacy with respect to their communications or activities while using employer resources.
4. Given sufficiently privileged access to the network handling code on a computer system, it is difficult to create packets with a forged source address.
5. Ethics can be universally enforced and laws apply to everyone.
6. Firewalls provide network protection based on a set of programs configured for each device.
7. Software is an example of real property.
8. An example of a patent from the computer security realm is the RSA public-key cryptosystem.