Explanation should include
- threats to data
- identity theft
- espionage
- privacy issues
- business losses
- loss of productivity.
Process/Skill Questions:
- What are the implications of the end user obtaining a rootkit on a network?
- When using a company network, to what degree of privacy are employees entitled?
- How is productivity affected when employees are given access to the Internet at work?