Problem
1. Why is an e-mail and Internet use policy needed?
2. What are the benefits of developing an incident response capability?
3. List the broad categories of security incidents.
4. List some types of tools used to detect and respond to incidents.