help please fast
1. Describe the CNSS security model. What are its three dimensions? 2. What is the definition of "privacy" as it relates to InfoSec? How is this definition different from the everyday definition? Why is this difference significant? 3. Define the InfoSec processes of identification, authentication, authorization, and accountability. 4. How does technological obsolescence constitute a threat to information security? How can an organization protect against it? 5. Does the intellectual property owned by an organization usually have value? If so, how can attackers threaten that value? 6. What are the three levels of planning? Define each. List the types of InfoSec plans and planning functions. 7. What is tort law and what does it permit an individual to do? 8. Which law amended the Computer Fraud and Abuse Act of 1986, and what did it change? 9. If you work for a financial service organization (such as a bank or credit union), which law from 1999 affects your use of customer data? What other effects does it have? 10. What is intellectual property? Is it offered the same protection in every country? What laws currently protect intellectual property in the United States and Europe? Do your own independent research and answer the following questions.(Each question = 10 points, Total =50 ) Each answer shonld be within half a page (Single spaced, times Roman, 12 font): 1. Consider the information stored in your personal computer. Do you currently have information stored in your computer that is critical to your personal life? If that information became compromised or lost, what effect would it have on you? 2. Using the Web, research Stuxnet. When was it discovered? What kind of systems does it target? Who created it and what is it used for? 3. Search the Web for "The Official Phreaker's Manual." What information in this manual might belp a security administrator to protect a communications system? 4. The chapter discussed many threats and vulnerabilities to information security. Using the Web, find at least two other sources of information about threats and vulnerabilities. Begin with www securityfocus.com and use a keyword search on "threats." 5. Using the Web, go to www.eff.org. What are the current top concerns of this organization