please answer these 4 answers:

What is information security?


Define the various roles of a security administrator.


What are three of the five categories authentication can be broken down into?


What is the name of the people who attempts to hack into a computer system before it goes live to test the system.