1) What is an illicit content attack? What is the difference between a virus, a worm, and a Trojan horse? How could a stand-alone computer or a network be a victim of an illicit content attack? 2) What is an Open Mail server? How could you protect a stand-alone computer or a network against illicit content attacks? What does a firewall do? 3) What is meant by systems intrusion? What is the difference between hackers, crackers, and script kiddies? 4) What is Social engineering? What is Brute Force attack? 5) What is the goal of an Information Security plan? What are the three main components of an Information Security plan?