1. What does the umbrella word malware stand for?
2. List as many types of malware as you can
3. What are the 4 elements of malware prevention?
4. How can Host Based Behavior Blocking software and Perimeter Scanning approaches
incorporate these elements?
5. How can we describe an exploit? How can we explain an attack?
6. What is a Buffer Overflow and what causes it?
7. What happens as a result of buffer overflow?
8. Web Security is intrinsic to transactions on the web. What are the security objectives of web
transaction security?
9. What are some of the issues that web transactions security deal with?
10. A major issue in transactions is spoofing. What is spoofing? What can be done to minimize
spoofing?
11. Access Attacks -> Eavesdropping, interception
Transmission Control Attacks -> TCP and SYN and TCP Hijacking
Choose one from each and describe
12. How can a network administrator prepare for a Denial of Service DOS attack?
13. What is a DOS attack?