1.Why is it important to distinguish between different types of attackers
2. Which of the four key security strategy elements discussed in the chapter do you think is the most important? Why?