Problem
1. What is a ping storm, and how does it apply to a denial-of-service attack?
2. List three forms of physical protection.
3. How can surveillance be used to improve network security?
4. How does an intrusion detection system work?
5. What is the major weakness of the password system? What is its major strength?