Answered step by step
Verified Expert Solution
Question
1 Approved Answer
1 Exercise 1.1: Consider the information stored on your personal computer. For each of the terms listed, find an example and describe it: threat, threat
1 Exercise 1.1: Consider the information stored on your personal computer. For each of the terms listed, find an example and describe it: threat, threat agent, vulnerability, exposure, risk, attack, and exploit. (15 points) Exercise 1.2: Describe in detail in your own words each of the critical characteristics of information mentioned in the textbook. How are they used in the study of computer security? Be sure to cite any outside sources of additional information used. (15 points) Exercise 1.3:Research \"the paper that started the study of computer security.\" Identify this paper and prepare a summary of the key points. What in this paper specifically addresses security in areas previously unexamined at the time? After all the years since this was written, does this report apply to today's environment? Why, Why not? Go beyond the textbook in your research and discussion. (20 points) Submit all three exercises in one document to the Written Assignments area to the left pane of the course. Include a cover page with your name, title of assignment, course title and date. Be sure your name is included in the title of the file. Assignment 2 Exercise 2.1: Consider the statement: "an individual threat, like a hacker, can be represented in more than one threat category." If a hacker hacks into a network, copies a few files, defaces the web page, and steals credit card numbers, how many different threat categories does this attack clearly cover given just the information provided? Based on the categories listed in chapter 2 and again in chapter 4, list the categories and explain your reasoning. Base you decision strictly on the information given. Do not speculate or assume. (15 points) Exercise 2.2: Research and explain your own words what the IT world identifies as intellectual property (IP)? From your research, is it afforded the same protection in every country of the world? Why or Why not? What laws currently protect it in the United States and Europe? Be sure to give examples of what laws are covered? Also, be sure to properly cite your sources. (20 points)Be thorough in your responses and go beyond the textbook to outside research to support your reasoning. Exercise 2.3: Using the Internet, browse to https://www.uscert.gov/ncas/current-activity and find the most recent CERT advisory. Describe this advisory in detail and determine what threat group and threat category this advisory warns against. Describe in detail and properly site your sources (15 points)
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started