infomation system security
User Generated
onfNW
Computer Science
Description
The book you need to do these questions:
https://docs.google.com/a/students.towson.edu/file/d/0B4F6U3z6tvjdUV90X25ON0x6WE0/edit
Chapter 1 questions:
page 35: The next day at SLS found everyone in technical support busy restoring computer systems to their former state and installing new virus and worm control software. Amy found herself learning how to install desktop computer operating systems and applications as SLS made a heroic effort to recover from the attack of the previous day. Questions:
1. Do you think this event was caused by an insider or outsider? Why do you think this?
2. Other than installing virus and worm control software, what can SLS do to prepare for the next incident?
3. Do you think this attack was the result of a virus, or a worm? Why do you think this?
Chapter 2 Questions:
1- Using the Internet, find and read the SANS/FBI Top 20 Vulnerabilities. Choose one of the 20 vulnerabilities listed and identify the threat group and threat category it warns about.
2- What is the difference between a threat and an attack? How do exploits relate to vulnerabilities?
3- Is there an ethically acceptable reason to study and use the various attack methods described in this chapter?
4- page84 Case Exercises: Soon after the board of directors meeting, Charlie was promoted to CISO, a new position that reports to the CIO Gladys Williams, and that was created to provide leadership for SLS's efforts to improve its security profile. Questions:
A. How do Fred, Gladys, and Charlie perceive the scope and scale of the new information security effort?
B. Which of the threats discussed in this chapter should receive Charlie's attention early in his planning process?
C. How will Fred measure success when he evaluates Gladys' performance for this project? How about Charlie's performance?
This question has not been answered.
Create a free account to get help with this and any other question!
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Similar Content
Related Tags
Death on the Nile
by Agatha Christie
The Lost Man
by Jane Harper
Underground A Human History of the Worlds Beneath our Feet
by Will Hunt
As I Lay Dying
by William Faulkner
The Kite Runner
by Khaled Hosseini
The Splendid and The Vile
by Erik Larson
A Separate Peace
by John Knowles
Silas Marner
by George Eliot
A Wrinkle as Time
by Madeleine L'Engle