1. What does the umbrella word malware stand for? 2. List as many types of malware as you can 3. What are the 4 elements of malware prevention? 4. How can Host Based Behavior Blocking software and Perimeter Scanning approaches incorporate these elements? 5. How can we describe an exploit? How can we explain an attack? 6. What is a Buffer Overflow and what causes it? 7. What happens as a result of buffer overflow? 8. Web Security is intrinsic to transactions on the web. What are the security objectives of web transaction security? 9. What are some of the issues that web transactions security deal with? 10. A major issue in transactions is spoofing. What is spoofing? What can be done to minimize spoofing? 11. Access Attacks -> Eavesdropping, interception Transmission Control Attacks -> TCP and SYN and TCP Hijacking Choose one from each and describe 12. How can a network administrator prepare for a Denial of Service DOS attack? 13. What is a DOS attack?