6.Explain the concept of discretionary access privileges.
7.One purpose of a database system is the easy sharing of data. But this ease of sharing can also jeopardize security. Discuss at least three forms of access control designed to reduce this risk.
8.Explain how the one-time password approach works.
9.Network communication poses some special types of risk for a business. What are the two broad areas of concern? Explain.
10.What is EDI? How does its use affect the audit trail?
11. Describe three ways in which IPS can be used to protect against DDoS Attacks?