Question 1: Identify and define the various types of information assets utilized by organizations. Provide an example of how organizations use the various type of information assets.
Question 2: Chronologize the development of the cybercrimes of hacking, email wiretapping, phishing, and vishing. Provide specific examples of each type of cybercrime and the challenges that exist in trying to ensure computer security.