PART I
1. Consider that an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker breaks into a network, copies a few files, defaces a Web page, and steals credit card numbers, how many different threat categories does the attack fall into?
2. Using the Web, research Mafiaboys exploits. When and how did he compromise sites? How was he caught?
3. Search the Web for The Official Phreakers Manual. What information in this manual might help a security administrator to protect a communications system?
4. The chapter discussed many threats and vulnerabilities to information security. Using the Web, find at least two other sources of information about threats and vulnerabilities. Begin with www.securityfocus.com and use a keyword search on threats.