1, Give two examples of Closed system. How wel does each protect its software?

2, Is each of the following an opn system or a closed system? For each system, give an example of a real-world attack...