0% found this document useful (0 votes)
87 views4 pages

Tutorial 3 PDF

This document contains questions from a tutorial on social and professional issues in computing. It covers topics like common computer security attacks, reasons for increased computer incidents, perpetrators of computer crimes and their objectives, distributed denial of service attacks, bring your own device policies, logic bombs, rootkits, phishing attacks, trustworthy computing, risk assessment, security policies, and computer forensics. It also includes questions about spam, prosecuting computer criminals, topics for employee security training, and motivations of hackers.

Uploaded by

Avikash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views4 pages

Tutorial 3 PDF

This document contains questions from a tutorial on social and professional issues in computing. It covers topics like common computer security attacks, reasons for increased computer incidents, perpetrators of computer crimes and their objectives, distributed denial of service attacks, bring your own device policies, logic bombs, rootkits, phishing attacks, trustworthy computing, risk assessment, security policies, and computer forensics. It also includes questions about spam, prosecuting computer criminals, topics for employee security training, and motivations of hackers.

Uploaded by

Avikash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Fiji National University

College of Engineering, Science and Technology


School of Mathematics and Computer Science
Department of Computer Science and Information systems
CIN711: Social and Professional Issues in Computing
Tutorial 3
Questions

1. What are the most common types of computer security attacks?

2. Identify and briefly discuss four reasons why computer incidents have become more prevalent.

3. Who are the primary perpetrators of computer crime, and what are their objectives?

4. A successful distributed denial-service attack requires downloading software that turns


unprotected computers into zombies under control of the malicious hacker. Should the owners of
the zombie computers be fined as a means of encouraging people to better safeguard their
computers? Why or why not?

5. What is BYOD? How does BYOD lead to computer related incidents or crimes?

6. What is a logic bomb?

7. What is a rootkit? Provide some examples of rootkits.

8. Distinguish between spear-phishing, smishing and vishing.

9. What is trustworthy computing? Discuss the four pillars of trustworthy computing?

10. What is risk assessment? Why risk assessment important? List down the generic steps of risk
assessment?

11. What is a security policy? Pick a security policy of a local organization and list the main
components of it. Bring in class for discussion.

12. List down some actions users/systems admins can do to help protect an organization’s
information systems and data.

13. Discuss the layers of protective measures that can be used in organizations to protect its data.

1
14. What is computer forensics?

15. Do you believe that spam is actually harmful? Why or why not?

16. Some IT security personnel believe that their organization should always employ whatever
resources are necessary to capture and prosecute computer criminals. Do you agree? Why or
why not?

17. You have been assigned to be a computer security trainer for all of your firm’s 2,000 employees,
contractors, and part-time workers. What are the key topics you would cover in your training
program?

18. What do you think motivates hackers to attempt to break into computers to probe their
defenses?

19. Refer to the extract from Fiji Times and answer questions that follow:

Hacking horrors

Nasik Swami
Tuesday, May 26, 2015

Cyber-related crimes have soared with the advancement of technology in the country.
HACKING is a fast growing crime in Fiji with police confirming that locals have lost more than
$1million because of cybercrime in the past three years.
Fiji Police Force Cybercrime Unit head Inspector Epi Veimosoi said yesterday that in the past three
years, they had registered 120 cybercrime cases, of which 20 involved hacking.
Insp Veimosoi said hacking was a reality in Fiji where local and foreign hackers had hacked into the
bank accounts of people and businesses.
He said police investigations revealed that in Fiji, some disgruntled employees who had lost their jobs
were hacking into the bank accounts of their former companies.
"These are the types of people who hack back into their accounts and delete or damage the system
just out of anger toward the employers," Insp Veimosoi said. "Such parties intend to destroy or
cripple their targets for the personal satisfaction of seeing them (employers) suffer the effects," he
said.
Insp Veimosoi said personal bank accounts of Fijians were also being targeted by foreign hackers who
obtained bank account details from people via emails, social networks, text messages or phone calls.
"Even Fijians are going overseas and hacking back into the accounts of people here. They leave the
country after gathering all the information and hack into the accounts from overseas," he said.

2
Insp Veimosoi said police had referred some cases to International Criminal Police Organisation
(INTERPOL) for further investigations as perpetrators were hacking into local accounts from countries
like China and Ghana.
He said credit card hacking was also common in Fiji whereby card holders had lost significant
amounts of money after exposing their card details.
He said the force had enough resources to determine the cases and had launched investigations

a) Who are the perpetrators of computer crime in this case study?


b) What damage or harm is experienced through these types of crimes?
c) What can be done to avoid these types of crimes?

21. Refer to the extract from Fiji Times and answer questions that follow:

Cyber bully alert


Siteri Sauvakacolo
Tuesday, December 16, 2014

CYBER bullying has become a concern with the Fiji Police Force as the number of internet users in Fiji
increases.
Police spokeswoman Ana Naisoro said the force's Cyber Crime Unit, which had been investigating
some of these cases, found that more children were now online and vulnerable to cyber bullies.
The revelation follows a recent survey which stated more than 3000 new Facebook accounts were
created in Fiji every month.
Police concerns follow overseas reports that victims of cyber bullying as young as 12 years old ended
up committing suicide.
An online system that manages company profiles on social network — zoomsphere.com — in its
report, Facebook users in the Oceania region, ranked Fiji third in the Pacific behind Australia and New
Zealand on the number of Facebook users.
According to the survey, there are 206,720 Fijian Facebook users.
It also revealed 103,640 Fijian males were on Facebook compared with 102,060 females.
Police spokeswoman Ana Naisoro said they had received reports of fake account holders who used
Facebook to belittle or degrade the character of others.
"These are common. People are misusing the intended purpose of Facebook," she said.
"It has also been noted that the age of account holders are getting younger. Parental supervision is
vital so that they know who they're online with."
Police chief operations officer ACP Rusiate Tudravu appealed to the public to report to the Cyber
Crime Unit if they felt they were targeted victims of cyber crime.

3
Consultant psychologist Selina Kuruleca said Facebook was an inexpensive, convenient way to stay
connected with family, friends.
However, she warned that adults needed to check on their children when they were online.
Ms Kuruleca said while some people took their personal grievances to Facebook as an outlet, there
were people who took advantage or poked fun at the misery of others.
"All bullying should be reported to relevant authorities. For someone who has been bullied, get
professional help. If you are a bully, you need help," Ms Kuruleca said.
"Just because someone has been bullied doesn't mean that you can inflict the same pain or violence
on someone else.
"So manage your time on FB, be aware of unscrupulous users who may be using false identification
to befriend you.
"Young people need to have a trusted adult/ parent who can check in online with them."
Ms Kuruleca said anecdotal evidence suggested that cyber bullying was on the rise in Fiji, although
not as high as in other countries such as New Zealand and Australia.

1. What are some factors that leads to young children to connect to social networks?
2. Who looks after cybercrime related cases in Fiji?
3. What are the possible crimes that can be committed through social media?
4. What can be done to avoid youngsters to access social media?

You might also like