0% found this document useful (0 votes)
383 views2 pages

Group Assignment 1 PDF

This document provides instructions for a group assignment for a computer security course. It includes two questions for each of two chapters. For chapter 1, students are asked to summarize a seminal paper in computer security and provide examples of security concepts from their own computers. They are also asked about a scenario involving recovering from an attack. For chapter 2, students are asked to analyze a hacking scenario and identify threat categories, research additional online sources on threats, and respond to a scenario about appointing a new Chief Information Security Officer. The assignment is due on February 14th electronically and February 21st as a hard copy.

Uploaded by

sonia123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
383 views2 pages

Group Assignment 1 PDF

This document provides instructions for a group assignment for a computer security course. It includes two questions for each of two chapters. For chapter 1, students are asked to summarize a seminal paper in computer security and provide examples of security concepts from their own computers. They are also asked about a scenario involving recovering from an attack. For chapter 2, students are asked to analyze a hacking scenario and identify threat categories, research additional online sources on threats, and respond to a scenario about appointing a new Chief Information Security Officer. The assignment is due on February 14th electronically and February 21st as a hard copy.

Uploaded by

sonia123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Computer Security IV

Group Assignment 1

During the Saturday Class of 14th February, 2015


Total Marks 80
I currently do not have access to the ITS Class List, so please form your own groups
preferably not more than seven in one group.

Submission Dates: 14th February (Electronic Copy)

21st February (Hard Copy)


Instructions:

 Use each chapter opening case scenario in order to answer Question 2 of each
chapter.
 You may need to need to access internet sites before discussions on Saturday.

Chapter 1 (40)
Question 1
a) Look up “the paper that started the study of computer security.” Prepare a summary of the key points. What
in this paper specifically addresses security in areas previously unexamined?
b) Consider the information stored on your personal computer. For each of the terms listed, find an example 
and document it: threat, threat agent, vulnerability, exposure, risk, attack, and exploit.

Question 2
The next day at SLS found everyone in technical support busy restoring computer systems to their former state 
and installing new virus and worm control software. Amy found herself learning how to install desktop 
computer operating systems and applications as SLS made a heroic effort to recover from the attack of the 
previous day.

Questions:
a) Do you think this event was caused by an insider or outsider? Why do you think this?
b) Other than installing virus and worm control software, what can SLS do to prepare for the next incident?
c) Do you think this attack was the result of a virus or a worm? Why do you think this?

Chapter 2 (40)
Question 1
a) Consider the statement: an individual threat agent, like a hacker, can be a factor in more than one threat 
category. If a hacker hacks into a network, copies a few files, defaces the Web page, and steals credit card 
numbers, how many different threat categories does this attack fall into?
b) The chapter discussed many threats and vulnerabilities to information security. Using the Web, find at least 
two other sources of information on threat and vulnerabilities. Begin with www.securityfocus.com and use 
a keyword search on “threats.”

Question 2
Soon after the board of directors meeting, Charlie was promoted to Chief Information Security Officer, a new 
position that reports to the CIO, Gladys Williams, and that was created to provide leadership for SLS’s efforts to
improve its security profile.

Questions:
a) How do Fred, Gladys, and Charlie perceive the scope and scale of the new information security effort?
b) How will Fred measure success when he evaluates Gladys’ performance for this project? How will he 
evaluate Charlie’s performance?
c) Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning 
process?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy