How should Barton handle the meeting with the analysts? What questions
should he be prepared to answer and how should he answer them?
How vulnerable is your company (or a company that you know) to a denial of
service (DoS) attack or intrusion? What should be done about such
vulnerabilities?
Why can’t perfect IT system security be achieved? If security can never be
perfect, how should you manage against malicious threats?