Group Assignment 1 PDF
Group Assignment 1 PDF
Group Assignment 1
Use each chapter opening case scenario in order to answer Question 2 of each
chapter.
You may need to need to access internet sites before discussions on Saturday.
Chapter 1 (40)
Question 1
a) Look up “the paper that started the study of computer security.” Prepare a summary of the key points. What
in this paper specifically addresses security in areas previously unexamined?
b) Consider the information stored on your personal computer. For each of the terms listed, find an example
and document it: threat, threat agent, vulnerability, exposure, risk, attack, and exploit.
Question 2
The next day at SLS found everyone in technical support busy restoring computer systems to their former state
and installing new virus and worm control software. Amy found herself learning how to install desktop
computer operating systems and applications as SLS made a heroic effort to recover from the attack of the
previous day.
Questions:
a) Do you think this event was caused by an insider or outsider? Why do you think this?
b) Other than installing virus and worm control software, what can SLS do to prepare for the next incident?
c) Do you think this attack was the result of a virus or a worm? Why do you think this?
Chapter 2 (40)
Question 1
a) Consider the statement: an individual threat agent, like a hacker, can be a factor in more than one threat
category. If a hacker hacks into a network, copies a few files, defaces the Web page, and steals credit card
numbers, how many different threat categories does this attack fall into?
b) The chapter discussed many threats and vulnerabilities to information security. Using the Web, find at least
two other sources of information on threat and vulnerabilities. Begin with www.securityfocus.com and use
a keyword search on “threats.”
Question 2
Soon after the board of directors meeting, Charlie was promoted to Chief Information Security Officer, a new
position that reports to the CIO, Gladys Williams, and that was created to provide leadership for SLS’s efforts to
improve its security profile.
Questions:
a) How do Fred, Gladys, and Charlie perceive the scope and scale of the new information security effort?
b) How will Fred measure success when he evaluates Gladys’ performance for this project? How will he
evaluate Charlie’s performance?
c) Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning
process?