Fundamentals and Threats

Words: 445
Pages: 2
Subject: Uncategorized

Prompt:

Choose one of the following discussion topics and create a post with your response:

1. Look up “the paper that started the study of computer security.” Prepare a summary of the key points. What in this paper specifically addresses security in previously unexamined areas?

2. Assume that a security model is needed for the protection of information in your class. Using the CNSS model, examine each of the cells and write a brief statement on how you would address the three components of each cell.

3. Using the Web, identify the chief information officer (CIO), chief information security officer (CISO), and systems administrator for your school. Which of these people represents the data owner? Which represents the data custodian?

4. Using the Web, find a large company or government agency that is familiar to you or located in your area. Try to find the name of the chief executive officer (CEO), the CIO, and the CISO. Which was easiest to find? Which was the hardest?

5. Using the Web, find out more about Kevin Mitnick. What did he do? Who caught him? Write a short summary of his activities and explain why he is infamous.

6. Using the Web, explore the technique known as “iterative and incremental development.” Then, investigate “agile development.” How are they related?

7. Consider that an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker breaks into a network, copies a few files, defaces a Web page, and steals credit card numbers, how many different threat categories does the attack fall into?

8. Using the Web, research Mafiaboy’s exploits. When and how did he compromise sites? How was he caught?

9. Search the Web for “The Official Phreaker’s Manual.” What information in this manual might help a security administrator to protect a communications system?

10. The chapter discussed many threats and vulnerabilities to information security. Using the Web, find at least two other sources of information about threats and vulnerabilities. Begin with www.securityfocus.com and use a keyword search on “threats.”

11. Using the categories of threats mentioned in this chapter and the various attacks described, review several current media sources and identify examples of each threat.

(Discussions courtesy of Whitman & Mattord (6th, 2018), Cengage Learning)

Let Us write for you! We offer custom paper writing services Order Now.

REVIEWS


Criminology Order #: 564575

“ This is exactly what I needed . Thank you so much.”

Joanna David.


Communications and Media Order #: 564566
"Great job, completed quicker than expected. Thank you very much!"

Peggy Smith.

Art Order #: 563708
Thanks a million to the great team.

Harrison James.


"Very efficient definitely recommend this site for help getting your assignments to help"

Hannah Seven