Problem
1. What are some of the major technology tactics used to protect networks?
2. What is CERT? Where is the CERT coordination center? What is FedCIRC?
3. What are scanners? What are password crackers? What are Trojan horses?
4. What are sniffers? And how can perpetrators use them?
5. What is DoS? Give an example.
6. Does TCP/IP have security holes? How can systems be protected?
7. What is a syn_fl ood attack?
8. What is IP spoofi ng?
9. What is hacking? In what four major areas are there security holes?
10. What is your opinion of today's state of ISs security and privacy?