Questions:
- How has computer security evolved into modern information security?
- Why are employees one of the greatest threats to information security?
- How has the perception of the hacker changed over recent years? What is the profile of a hacker today?
- Classify each of the following occurrences as an incident or disaster. If an occurrence is a disaster, determine whether business continuity plans would be called into play. For each of the scenarios (a–e), describe the steps necessary to restore operations. Indicate whether law enforcement would be involved.
- A hacker breaks into the company network and deletes files from a server.
- A fire breaks out in the storeroom and sets off sprinklers on that floor. Some computers are damaged, but the fire is contained.
- A tornado hits a local power station, and the company will be without power for three to five days.
- Employees go on strike, and the company could be without critical workers for weeks.
- A disgruntled employee takes a critical server home, sneaking it out after hours.


