Respond with at least 50 words each question
Assignment 1
1. Consider the statement: an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker hacks into a network, copies a few files, defaces the Web page, and steals credit card numbers, how many different threat categories does this attack fall into?
2. Search the Web for the “ The Official Phreaker’s Manual.” What information con-tained in this manual might help a security administrator to protect a communications system?
Assignment 2
1. Using the Web, research Mafiaboy’s exploits. When and how did he compromise sites? How was he caught?
2. 4. The chapter discussed many threats and vulnerabilities to information security. Using the Web, find at least two other sources of information on threat and vulnerabilities. Begin with www. Securityfocus.com and use a keyword search on “ threats.”
Assignment 3
Soon after the board of directors meeting, Charlie was promoted to Chief Information Security Officer, a new position that reports to the CIO, Gladys Williams, and that was created to provide leadership for SLS’s efforts to improve its security profile.
1. How do Fred, Gladys, and Charlie perceive the scope and scale of the new information security effort?
2. How will Fred measure success when he evaluates Gladys’ performance for this project? How will he evalute Charlie’s performance?
3. Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?