Tutorial 1
Tutorial 1
Tutorial 1: Introduction
Assures that information and programs are The quality that a system has when it
changed only in a specified and authorized performs its intended function in an
manner unimpaired manner, free from unauthorized
manipulation of the system
3. What is the difference between the term threat and attack? Give one example for each term.
Threat Attack
Passive Active
5. List and briefly define categories of passive and active network security attacks. Use diagrams
to explain your answer.
(1) Release of message content
For a release of message content, a telephonic conversation, an E-mail message or a
transferred file may contain confidential data. A passive attack monitors the contents of
the transmitted data. Passive attacks are very difficult to detect because they do not
involve any alteration of the data.
[2] Replay
A replay attack occurs when a cybercriminal eavesdrops on a secure network communication,
intercepts it, and then fraudulently delays or resends it to misdirect the receiver into doing what
the hacker wants.
6. Consider an online internet banking system in which users provide a password and account
number for account access. Give examples of confidentiality, integrity and availability
requirements associated with the system and in each case, indicate the degree of importance
of the requirement.
Confidentiality
o The system must keep personal identification number confidential, both in the host system and
during transmission for a transaction.
- Integrity
- Availability
o Availability of the host system is important to the economic well being of the bank, but not
to its fiduciary responsibilities. The availability of individual teller machine is less concern.
7. Differentiate between a network attack surface and a software attack surface.
8. Since the beginning of the Information Technology era in the 90’s, the term security is widely
used and applied until today. No doubt, security has become more crucial in every aspect of
Information Technology.
(i) Briefly distinguish the differences between computer security and Internet security.
Support each explanation with ONE (1) example.
Computer security mean that it will happen on a standalone computer’s software and
hardware.
o Example – the individual computer only will be affected by the attacker
-
Internet security mean the individual computer or other devices and the network they
connected will be affected by attacker. Example – those devices included the printer, phone and
etc.
(ii) In your opinion, why is it so important to understand these 2 terms in the question
above? Provide TWO (2) reasons to support your answer.
Cyber security
- Because the network is involved and protected our personal information, intellectual
property, data and industry information, avoided those attackers to get those data.
-
Computer security
- Because it can protect your personal data and to maintain the healthy of the computer
to ensure when you are using your computer in faster and smoother performance.
9. “Inside attack is more dangerous than outside attack.” Do you agree with the statement?
Justify your answer.
10. Differentiate authenticity from authorization. Give ONE (1) example for each.
202109 1