Homework
• What are some examples of confidential information? (Provide at least 5 examples).
• What does a buffer overflow do?
• Why is it important for information security professionals to know the laws that affect them?
• What are some other security models besides the CIA triad?
• What are the four components of security documentation?
• What are responsibilities of a security architect?
• What is authentication? What is authorization? Together, what are authentication and authorization used for?
• What are the three commands for administering database object permissions?
• What best practice network architecture should be used for databases that provide data via a web server to the Internet?
• Why is encryption generally not used in the core layer?
Format your homework according to the give formatting requirements:
• The answer must be using Times New Roman font (size 12), double spaced, typed, with one-inch margins on all sides.
• The response also includes a cover page containing the student's name, the title of the homework, the course title, and the date. The cover page is not included in the required page length.
• Also include a reference page. The references and Citations should follow APA format. The reference page is not included in the required page length.