Preview

case study

Satisfactory Essays
Open Document
Open Document
620 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
case study
Computer Security IV

Chapter 1 (40)
Question 1
a) Look up “the paper that started the study of computer security.” Prepare a summary of the key points. What in this paper specifically addresses security in areas previously unexamined?
b) Consider the information stored on your personal computer. For each of the terms listed, find an example and document it: threat, threat agent, vulnerability, exposure, risk, attack, and exploit.

Question 2
The next day at SLS found everyone in technical support busy restoring computer systems to their former state and installing new virus and worm control software. Amy found herself learning how to install desktop computer operating systems and applications as SLS made a heroic effort to recover from the attack of the previous day.

Questions:
a) Do you think this event was caused by an insider or outsider? Why do you think this?
b) Other than installing virus and worm control software, what can SLS do to prepare for the next incident?
c) Do you think this attack was the result of a virus or a worm? Why do you think this?

Chapter 2 (40)
Question 1
a) Consider the statement: an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker hacks into a network, copies a few files, defaces the Web page, and steals credit card numbers, how many different threat categories does this attack fall into?

a. Overall, I believe this attack falls into four major threat categories: deliberate acts of trespass, compromises to intellectual property, technical failures, and managerial failure. Furthermore, I believe this attack would be categorized as a deliberate act of theft/trespass which compromises intellectual property due to technical and managerial failures. b. It seems as this hacker was deliberately causing harm (i.e. copying files, vandalizing the web page, and theft of credit card numbers); due to their method of entry – hacking into a network – it leaves me to believe there were some

You May Also Find These Documents Helpful

  • Good Essays

    b. As Professor Graham Allison of the Harvard John F. Kennedy School of Government, explains:…

    • 1993 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Lab 2 Instructions

    • 389 Words
    • 2 Pages

    3. Identify and document 2 vulnerabilities you found interesting in terms of your computer use at home or work. How could your work or home computer be affected?…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    FXT2 Task 2 Follow Up

    • 799 Words
    • 3 Pages

    By “the nature of the attacks” I interpret this to mean the source of the attacks, or the skillset required to carry out the attacks. I believe this employee was tenured based on their ability to:…

    • 799 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Is3110 Week5 Quiz

    • 218 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 218 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    5 List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    2. A virus or malware can impact which of the three tenets of information systems security (confidentiality, integrity, or availability)? In what way?…

    • 787 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Defense against web attacks is a key element in a security professional’s skill set. For this assignment, your manager has asked you to review the Aim Higher College’s Web server and application security and to suggest appropriate defenses. For each of the following scenarios, explain what the threat or threats are, what defenses you would recommend, and why.…

    • 1988 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    IS4560 Lab 1 Assessment

    • 292 Words
    • 1 Page

    13. To truly test the IT security team, if they know the attack is coming they can prepare for the attack.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It is also important to explore the device(s) that were targeted by the attack. In this instance, being the SMB server within the LAN. The SMB server utilizes an application layer network protocol, which can run atop the session layer. It provides shared access to files, printers, serial ports, and network nodes (workstations, laptops, desktops, etc.) and provides a client/server relationship throughout the network. This means that every domain layer of the IT Infrastructure…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Fcs 006

    • 856 Words
    • 4 Pages

    Name: ________________________ Class: ___________________ Date: __________ CS11-Online-Chapter09 Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 1. Computer crime is sometimes referred to as ____. a. hacking c. b. cybercrime d.…

    • 856 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”?…

    • 454 Words
    • 2 Pages
    Good Essays
  • Good Essays

    IS3230 Final Exam Answers

    • 939 Words
    • 4 Pages

    9. When considering access control security options to mitigate vulnerabilities within the infrastructure, it is ________.…

    • 939 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Write a 1,000- to 1,500-word paper on at least three major information security threats that a specific organization you choose faces today.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    After a thorough investigation by federal law enforcement it had been determined that hackers were able to infiltrate the network and place malware on several pieces of the companies Point of Sale (POS) systems. The attackers were meticulous and thought through their attack, attempting to…

    • 1162 Words
    • 5 Pages
    Better Essays