0% found this document useful (0 votes)
70 views1 page

Net 455 (Information Security) Tutorial 1 Chapter 1

This document discusses an online banking system and the importance of confidentiality, integrity, and availability requirements for users. It also asks the reader to provide examples from their personal computer of threats, threat agents, vulnerabilities, exposures, risks, attacks, and exploits. Finally, it presents a case study where a company had to restore its computer systems after an attack and asks questions about whether the attack was from an insider or outsider, what else the company can do to prepare, and if the attack was from a virus or worm.

Uploaded by

sonia123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views1 page

Net 455 (Information Security) Tutorial 1 Chapter 1

This document discusses an online banking system and the importance of confidentiality, integrity, and availability requirements for users. It also asks the reader to provide examples from their personal computer of threats, threat agents, vulnerabilities, exposures, risks, attacks, and exploits. Finally, it presents a case study where a company had to restore its computer systems after an attack and asks questions about whether the attack was from an insider or outsider, what else the company can do to prepare, and if the attack was from a virus or worm.

Uploaded by

sonia123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Net 455 (Information Security)

Tutorial 1 Chapter 1

1. Consider an online internet banking system in which users provide a password and
account number for access. Give examples of confidentiality, integrity and availability
requirements associated with the system and in each case, indicate the degree of
importance of the requirement.

2. Consider the information stored on your personal computer. For each of the terms listed,
find an example and document it: threat, threat agent, vulnerability, exposure, risk,
attack, and exploit.
Case Exercise:
3. The next day at SLS found everyone in technical support busy restoring computer systems
to their former state and installing new virus and worm control software. Amy found
herself learning how to install desktop computer operating systems and applications as
SLS made a heroic effort to recover from the attack of the previous day.

Questions:

1. Do you think this event was caused by an insider or outsider? Why do you think this?
2. Other than installing virus and worm control software, what can SLS do to prepare for
the next incident?
3. Do you think this attack was the result of a virus or a worm? Why do you think this?

You might also like