Answer the following questions.
1. Briefly discuss the three incidents of the 1980s that exposed the vulnerability of data systems and outlined potential repercussions for national security.
2. List and describe the primary motivations for computer intrusion or theft of information in contemporary society.
3. Differentiate between traditional crime and computer crime.
4. Discuss what can be done to apprehend/prevent computer-related crime.