1. • Explain briefly what is meant by each of the following terms, and give an example in each case:
    (a) Denial of Service attack
    (b) Trojan Horse
    (c) Buffer Overflow

  2. • If you were a system administrator, what advice would you give users regarding the selection of passwords?

  3. • You have been asked to advise someone who manages a small business with five desktop PCs and one server machine providing access to shared files, access to printers and a web server. The office has a broadband Internet connection. What would your “Top 10” security guidelines for this person.

  4. • Why do organisations need to have a security policy?

  5. • In the context of IT security, what do the following terms mean?
    (a) Threat
    (b) Attack
    (c) Vulnerability
    (d) Risk management

  6. • Authentication is one of six standard security services. List and briefly discuss the five other standard security services. In the case of each of the 6 services, give an example of why it is needed. In the case of each of the six services, give one security mechanism or technology that helps to provide that service.