Exercise 2.1: Consider the statement: “an individual threat, like a hacker, can be represented in more than one threat category.” If a hacker hacks into a network, copies a few files, defaces the web page, and steals credit card numbers, how many different threat categories does this attack clearly cover given just the information provided? Based on the categories listed in chapter 2 and again in chapter 4, list the categories and explain your reasoning. Base you decision strictly on the information given. Do not speculate or assume.
Exercise 2.2: Research and explain your own words what the IT world identifies as intellectual property (IP)? From your research, is it afforded the same protection in every country of the world? Why or Why not? What laws currently protect it in the United States and Europe? Be sure to give examples of what laws are covered? Also, be sure to properly cite your sources. Be thorough in your responses and go beyond the textbook to outside research to support your reasoning.
Exercise 2.3: Using the Internet, browse to https://www.us-cert.gov/ncas/current-activity and find the most recent CERT advisory. Describe this advisory in detail and determine what threat group and threat category this advisory warns against. Describe in detail and properly site your sources