1.What is a false reject rate? What is a false accept rate? What is their relationship to the crossover error rate? Research the Internet and give at least 4 concrete examples of the different rates and describe why they are important.
2.Describe the components of PKI? Give a list of at least 4 Certificate Authorities and their ongoing rates for issuing a certificate. Based on research over the Internet, what is the cheapest certificate you could find?
3.What is physical security? What are the primary threats to physical security? How are they manifested in attacks against the organization? How does physical access control differ from logical access control described in earlier chapters? How is it similar? Research the Internet and give at least 4 concrete examples of physical security failures.
4.What are the first five security categories of constraints to project plan implementation (see pages 441-442)? Explain and give one concrete example (based on Internet research) for each one of them.
5.List and describe four vulnerability intelligence sources. Based on Internet research which of of those that you listed seems the most effective? Why?