1. Define the terms Authentication, confidentiality, integrity, and availability.
2. Describe the following terms used for attackers:
Black hat hacker
White hat hacker
Gray hat hacker
3. Research and give a practical example of the first step of the kill chain.
4. An organization that purchased security products from different vendors is
demonstrating which security principle? Explain.
a. obscurity
b. diversity
c. limiting
d. layering
5. Consider an automated teller machine (ATM) in which users provide a personal
identification number (PIN) and a card for account access. Give examples of
confidentiality, integrity, and availability requirements associated with the system. In
each case, indicate the degree of importance of the requirement.
6. Read the article “Aspects of Internet Security.” Compose a paper of no more than 2
pages that summarizes the key concepts that emerge from the paper.


0 comments