1. Computer SecurityCS 426 Lecture 9 Access Control for Host Intrusion Prevention 2. Review Malware trojan horses, viruses, worms, botnets, rootkits Two questions from last…