Answer all questions with original and substantiated responses. DO NOT Plagiarize. Cite source. Use no more than 5% citations. Each answer to each question MUST be one paragraph in length, with a minimum of 5 SENTENCES in each paragraph response.
1. Why is network security particularly difficult to achieve?
2. Why are network vulnerability assessments important?
3. Why is IP Spoofing always unethical? What are some examples from real life?
4. What is the basis for defining trust in networks and what does that imply in terms of the protection requirements?
5. Why are perimeters so important to the physical design of secure networks?
6. What differentiates network equipment from other kinds of computer equipment? What unique security issues foes this difference raise?
7. How does connection control differ from transmission control? Why are both of these functions essential to secure transmission?
8. Why is configuration an important aspect of both transmission control and connection control?
9. What is the purpose of a virus? Why is it harmful? What property of a virus might make it even more harmful?
10. What potential ways can a Trojan horse attack your computer? How are Trojan horses delivered over networks? What special property of a Trojan horse makes it particularly dangerous to Internet users?