Q1. Describe the common program threats in detail.
Q2. In brief describe the worms and viruses in terms of system threats.
Q3. prepare down a detail note on the Signature based detection and anomaly detection.
Q4. In brief describe the system call monitoring.
Q5. What do you mean by encryption? In brief describe the different encryption methods for data security.
Q6. Describe the process management in the Linux all along with the system calls used.