Question 1.Answer the following questions from Chapter 5 in the text with a paragraph that contains at least five sentences. Include the question and number your answers accordingly.a. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?b. How has the term hacking changed meaning over the years?c. What is the most dangerous hacker tool?d. From the news: How were NSA’s hacker tools compromised?e. What was the vulnerability in the Target Breach?f. What do you think of hactivism?g. How did Stuxnet work?h. What was the Arpanet?i. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?j. What is the Red Team?Question 2.Write 500 words explaining that You are the web master of a college website. You share a server with other school departments such as accounting and HR.Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.Write your answer using a WORD document. Do your own work and use your own words. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.