How is a network different from a stand-alone computer?
Explain at least three methods whereby networks are connected.
Describe eavesdropping and wiretapping as it applies to attacks upon networks.
Explain some of the unique reasons that make networks vulnerable to interception of data.
What is involved in a denial of service attack?
Describe the purpose and design of a typical firewall..
What are the main components of a database?
What are the legitimate purposes of databases?
Explain the defining characteristics of the cloud.
What are the three main types of cloud systems? How do they differ?
What are the main components of a typical company’s security plan?
How is a business continuity plan different from an incident response plan?
What is the basic formula for risk analysis? Apply it to a specific risk. You may make up the numbers involved.
What is meant by “the internet of things”? Give three examples.
What is meant by cyber warfare?