Preview

case study

Satisfactory Essays
Open Document
Open Document
620 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
case study
Computer Security IV

Chapter 1 (40)
Question 1
a) Look up “the paper that started the study of computer security.” Prepare a summary of the key points. What in this paper specifically addresses security in areas previously unexamined?
b) Consider the information stored on your personal computer. For each of the terms listed, find an example and document it: threat, threat agent, vulnerability, exposure, risk, attack, and exploit.

Question 2
The next day at SLS found everyone in technical support busy restoring computer systems to their former state and installing new virus and worm control software. Amy found herself learning how to install desktop computer operating systems and applications as SLS made a heroic effort to recover from the attack of the previous day.

Questions:
a) Do you think this event was caused by an insider or outsider? Why do you think this?
b) Other than installing virus and worm control software, what can SLS do to prepare for the next incident?
c) Do you think this attack was the result of a virus or a worm? Why do you think this?

Chapter 2 (40)
Question 1
a) Consider the statement: an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker hacks into a network, copies a few files, defaces the Web page, and steals credit card numbers, how many different threat categories does this attack fall into?

a. Overall, I believe this attack falls into four major threat categories: deliberate acts of trespass, compromises to intellectual property, technical failures, and managerial failure. Furthermore, I believe this attack would be categorized as a deliberate act of theft/trespass which compromises intellectual property due to technical and managerial failures. b. It seems as this hacker was deliberately causing harm (i.e. copying files, vandalizing the web page, and theft of credit card numbers); due to their method of entry – hacking into a network – it leaves me to believe there were some

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 454 Lab 4 Essay

    • 457 Words
    • 2 Pages

    (1 point) 6. The first attack demonstrated on the Nittany Corp. network in the lab video is this kind of attack.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    FXT2 Task 2 Follow Up

    • 799 Words
    • 3 Pages

    By “the nature of the attacks” I interpret this to mean the source of the attacks, or the skillset required to carry out the attacks. I believe this employee was tenured based on their ability to:…

    • 799 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 1164 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 748 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3110 Week5 Quiz

    • 218 Words
    • 2 Pages

    4. As much as 80% of all incidents are a result of internal attacks. List four inappropriate usages from users.…

    • 218 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”?…

    • 454 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 2 Instructions

    • 389 Words
    • 2 Pages

    3. Identify and document 2 vulnerabilities you found interesting in terms of your computer use at home or work. How could your work or home computer be affected?…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 670 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    It is also important to explore the device(s) that were targeted by the attack. In this instance, being the SMB server within the LAN. The SMB server utilizes an application layer network protocol, which can run atop the session layer. It provides shared access to files, printers, serial ports, and network nodes (workstations, laptops, desktops, etc.) and provides a client/server relationship throughout the network. This means that every domain layer of the IT Infrastructure…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Fcs 006

    • 856 Words
    • 4 Pages

    Name: ________________________ Class: ___________________ Date: __________ CS11-Online-Chapter09 Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 1. Computer crime is sometimes referred to as ____. a. hacking c. b. cybercrime d.…

    • 856 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    After a thorough investigation by federal law enforcement it had been determined that hackers were able to infiltrate the network and place malware on several pieces of the companies Point of Sale (POS) systems. The attackers were meticulous and thought through their attack, attempting to…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Write a 1,000- to 1,500-word paper on at least three major information security threats that a specific organization you choose faces today.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    4 As much as 80% of all incidents are a result of internal attacks. List four inappropriate usages from users…

    • 531 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Defense against web attacks is a key element in a security professional’s skill set. For this assignment, your manager has asked you to review the Aim Higher College’s Web server and application security and to suggest appropriate defenses. For each of the following scenarios, explain what the threat or threats are, what defenses you would recommend, and why.…

    • 1988 Words
    • 8 Pages
    Better Essays
  • Good Essays

    2. A virus or malware can impact which of the three tenets of information systems security (confidentiality, integrity, or availability)? In what way?…

    • 787 Words
    • 3 Pages
    Good Essays