1. Why is it appropriate to criminally prosecute hackers for simply breaking into government computers? Should we prosecute those who break into private corporation computers if no other criminal activity occurs? Explain your answer in detail.
  2. Investigate Web sites that give advice on avoiding identity theft. What advice do they give on how to avoid being a victim?
  3. Research and compare security tools that claim to protect home and enterprise internet operations. Which were most effective and least effective?