Question 1 You have recently been offered an intern position in your tertiary instution as a junior Computer Lab supervisor. Your manager wants you to take a leading role in managing the computer lab, in particular, security data, applications and the network. Your manager requested you to explain the categories of attackers to everyone that will be attending the next staff meeting. In preparation of this, answer the following questions: Q.1.1 Using the Computer Lab scenario above, provide one example of an attack that each of the attackers (A – C below) could use to attack/compromise the computer lab data, applications, or network security. Attacker Type Example A. Hackavists B. Script kiddies C. Insiders Q.1.2 Describe how you would use any two security principles to defend against any of the attacks you mentioned in Q.1.1 above. Q.1.3 For the following concept, provide a definition and a suitable example. Include the information security implication as well in your answer. • Thwarting identity theft.

MIS
9th Edition
ISBN:9781337681919
Author:BIDGOLI
Publisher:BIDGOLI
Chapter5: Protecting Information Resources
Section: Chapter Questions
Problem 1P
icon
Related questions
Question

Question 1
You have recently been offered an intern position in your tertiary instution as a junior Computer
Lab supervisor. Your manager wants you to take a leading role in managing the computer lab, in
particular, security data, applications and the network.
Your manager requested you to explain the categories of attackers to everyone that will be
attending the next staff meeting. In preparation of this, answer the following questions:
Q.1.1 Using the Computer Lab scenario above, provide one example of an attack that
each of the attackers (A – C below) could use to attack/compromise the computer
lab data, applications, or network security.
Attacker Type Example
A. Hackavists
B. Script kiddies
C. Insiders

Q.1.2 Describe how you would use any two security principles to defend against any of
the attacks you mentioned in Q.1.1 above.

Q.1.3 For the following concept, provide a definition and a suitable example. Include
the information security implication as well in your answer.
• Thwarting identity theft.

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
MIS
MIS
Computer Science
ISBN:
9781337681919
Author:
BIDGOLI
Publisher:
Cengage