1.Name and briefly explain four recent information security attacks you heard.
2.Describe various Information Security layers with the help of a diagram.
3.Explain the terms assets, threats, threat actor, vulnerability, attack vector, likelihood, and risk with scooter scenario and diagram.
4.Differentiate a worm and virus with examples.
5.Describe how Crypto-malware work with an example.
6.What are botnets? Name one botnet you know.
7.Explain five basic protections provided by Cryptography with an example.
8.Explain Asymmetric (public key) cryptography with the help of a diagram.
9.Explain the use of Digital signature with the help of a diagram.
10.Briefly explain the procedures in getting a digital certificate.
11.Operating systems come packaged with many digital certificates from certificate authorities (CAs). Use the Internet to determine how to view the CAs for the type and version of operating system that you are using and view the list. How many have you heard of? How many are unknown?
12.List the four stages of a certificate life cycle with example.
13.What are some of the most widely publicized DoS attacks that have occurred recently? Who was the target? How many DoS attacks occur on a regular basis? What are some ways in which DoS attacks can be prevented?
14.Differentiate man-in-the middle and Man-in-the -browser attacks.
15.List and briefly explain various Cross-Site attacks.