- What are ways to protect your personal computer?
- What are the five most important concerns for safety and security of a network and the computers in the network?
- What is the difference between automated and dynamic modus operandi, including the kinds of information to look for?
- Which act strengthened criminal laws against identity theft?
- Encrypt the SPACE character using the public key (3, 667). Show your work fully.
- Who are the typical stakeholders that can be used to collect vital information on the roles and responsibilities of the CSIRT?
- Using a web browser, identify at least five sources you would want to use when training a CSIRT. Include the URLs of your sources.
- True or false? Some process of managed downgrading of information is needed to restore reasonable classification levels.