A) Pick two of these questions, restate each selected question, then in the next line, post your viewpoint/answer to it. Make sure you state your reasons or justification to your answer. Make sure also to include at least one reference and properly cite from the reference.
- During the early computing era between 1970s and 1980s, what would be considered a (give examples of each)
- A minicomputer?
- An operating system?
- What is Client/Server computing? Which is what – give examples?
- What is the difference between a physical network and a logical network?
- Compare and contrast: Internet, Intranet, and Extranet.
- How does an attack differ from a security risk?
- What is a security control?
- What is authentication and how does it differ from authorization?
- What is steganography? How is it used in security technology?
- Is a single network logon the same as a central system logon?
- Why would there be a need for remote data access?
- Discuss some of the corporate vulnerabilities in an organization – not necessarily computer related.
- Describe the differences between trusted domains and trusting domains.
- What are some of things you can do to deter intruders away from your computer?