1. What are the six components of information warfare?
2. Define critical infrastructure and give specific examples of these types of system vulnerabilities as they relate to cyberterrorism and information warfare within the U.S.
3. Looking at the different theories mentioned in Chapter 3, why do individuals commit digital crime?