Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1 Exercise 1.1: Consider the information stored on your personal computer. For each of the terms listed, find an example and describe it: threat, threat

1 Exercise 1.1: Consider the information stored on your personal computer. For each of the terms listed, find an example and describe it: threat, threat agent, vulnerability, exposure, risk, attack, and exploit. (15 points) Exercise 1.2: Describe in detail in your own words each of the critical characteristics of information mentioned in the textbook. How are they used in the study of computer security? Be sure to cite any outside sources of additional information used. (15 points) Exercise 1.3:Research \"the paper that started the study of computer security.\" Identify this paper and prepare a summary of the key points. What in this paper specifically addresses security in areas previously unexamined at the time? After all the years since this was written, does this report apply to today's environment? Why, Why not? Go beyond the textbook in your research and discussion. (20 points) Submit all three exercises in one document to the Written Assignments area to the left pane of the course. Include a cover page with your name, title of assignment, course title and date. Be sure your name is included in the title of the file. Assignment 2 Exercise 2.1: Consider the statement: "an individual threat, like a hacker, can be represented in more than one threat category." If a hacker hacks into a network, copies a few files, defaces the web page, and steals credit card numbers, how many different threat categories does this attack clearly cover given just the information provided? Based on the categories listed in chapter 2 and again in chapter 4, list the categories and explain your reasoning. Base you decision strictly on the information given. Do not speculate or assume. (15 points) Exercise 2.2: Research and explain your own words what the IT world identifies as intellectual property (IP)? From your research, is it afforded the same protection in every country of the world? Why or Why not? What laws currently protect it in the United States and Europe? Be sure to give examples of what laws are covered? Also, be sure to properly cite your sources. (20 points)Be thorough in your responses and go beyond the textbook to outside research to support your reasoning. Exercise 2.3: Using the Internet, browse to https://www.uscert.gov/ncas/current-activity and find the most recent CERT advisory. Describe this advisory in detail and determine what threat group and threat category this advisory warns against. Describe in detail and properly site your sources (15 points)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Business Law Today The Essentials

Authors: Roger LeRoy Miller, Gaylord A. Jentz

9th Edition

9780324786156, 324786344, 324786158, 9780324786347, 978-0324786156

More Books

Students also viewed these Law questions

Question

Mention the bases on which consumer market can be segmented.

Answered: 1 week ago

Question

Explain consumer behaviour.

Answered: 1 week ago

Question

Explain the factors influencing consumer behaviour.

Answered: 1 week ago