1. Cybercirminals can use malware to steal files and information from your computer, if this happens you have loss of confidentiality. Explain how antivirus can be help to prevent from the loss of confidentiality caused by malware?
2. What security control should be used to restrict guest access and in so doing protect confidentiality, integrity, and availability of internal IT system?
3. Suppose you have used wireshark to capture network traffice. Describe how you could use the capture packets to discover and list all the IP addresses for the hosts connected to the network segment? What type of packets you would look for?
4. Name and describe three tools used during investigaiton (security incident). For each describe the type of information controlled an analyzed