Net 455 (Information Security) Tutorial 1 Chapter 1
Net 455 (Information Security) Tutorial 1 Chapter 1
Tutorial 1 Chapter 1
1. Consider an online internet banking system in which users provide a password and
account number for access. Give examples of confidentiality, integrity and availability
requirements associated with the system and in each case, indicate the degree of
importance of the requirement.
2. Consider the information stored on your personal computer. For each of the terms listed,
find an example and document it: threat, threat agent, vulnerability, exposure, risk,
attack, and exploit.
Case Exercise:
3. The next day at SLS found everyone in technical support busy restoring computer systems
to their former state and installing new virus and worm control software. Amy found
herself learning how to install desktop computer operating systems and applications as
SLS made a heroic effort to recover from the attack of the previous day.
Questions:
1. Do you think this event was caused by an insider or outsider? Why do you think this?
2. Other than installing virus and worm control software, what can SLS do to prepare for
the next incident?
3. Do you think this attack was the result of a virus or a worm? Why do you think this?