1) Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences? If so, why; if not, why not. What factors typically influence the end-user decision to report (or not report) a potential incident?
2) Using a Web browser, visit the honeynet site. What is this Web site, and what does it offer the information security professional? Visit the "Know your Enemy" white- paper series and select a paper based on the recommendation of your professor. Read it and prepare a short overview for your class.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.