Tutorial 1
Tutorial 1
Question 1
1. Distinguish between vulnerability, threat and control.
Threat is a set of circumstances that has the potential to cause loss or harm.
Question 2
What is the difference between data integrity and system integrity?
Data Integrity usually ensures that the information can be changed only in an authorized and
specified manner.
System Integrity: Assures that a system performs its intended function in an unimpaired manner,
free from deliberate or inadvertent unauthorized manipulation of the system.
Question 3
What is the difference between the term threat and attack? Give one example for each term.
Threat Attack
For example, the hacker hacks into the For example, the hacker hack into the
company to steal their information then it company system and bring in some virus
will bring a negative impact to the to cause the system to break down.
company.
Question 4
What is the difference between passive and active security threats?
Passive Active
Question 5
List and briefly define categories of passive and active network security attacks. Use
diagrams to explain your answer.
Passive Attack
Release of Message Contents - When the messages are exchanged neither the sender nor the
receiver is aware that a third party may capture the messages.
Traffic Analysis - access the same network as you to listen (and capture) all your network traffic.
Active Attack
Replay - Involves the passive capture of a data unit and its subsequent retransmission to
produce an unauthorized effect.
Masquerade - Takes place when one entity pretends to be a different entity. Usually includes
one of the other forms of active attack.
Modification of Messages - Some portion of a legitimate message is altered, or messages are
delayed or reordered to produce an unauthorized effect.
Denial of Service - Prevents or inhibits the normal use or management of communications
facilities.
Question 6
Consider an online internet banking system in which users provide a password and account
number for account access. Give examples of confidentiality, integrity and availability
requirements associated with the system and in each case, indicate the degree of importance of
the requirement.
Confidentiality only allows and authorizes the online banking user to login to the account with a
unique username, password, and secure key(for example, login phase).
Integrity is avoiding the payment record to be modified by anyone who accesses the banking
website to make sure the record is true and accurate.
Availability allows the banking website to be visited by authorized users who have an account
when they are needed.
Question 7
Network Attack Surface: Vulnerabilities over enterprise network, wide-area network, or the Internet.
Software Attack Surface: Vulnerabilities in application, utility or operating system code.
Question 8
Briefly distinguish the differences between computer security and Internet security.
Support each explanation with ONE (1) example.
i) computer security basically is the protection of computer systems and information from harm,
theft, and unauthorized use. It is the process of preventing and detecting unauthorized use of
your computer system. Example : information security,application security, computer security,
network security and cyber security.
ii)Internet security consists of a range of security tactics for protecting activities and transactions
conducted online over the internet such as hacking into computer systems, email addresses, or
websites.
May help to understand what and which appropriate security approaches to be applied correctly.
To ensure our data is safe and secure both on the computer and Internet.
Question 9
Agree, inside attack is more dangerous as insiders already have the knowledge of what's
important within a network and where it's located, something that external attackers
don't usually know from the start
Question 10
Authenticity is to confirm that users are who they say they are.
Exp: enter username and password when login.
Authorization is giving those users permission to access resources.
Exp: admin gives appropriate access to users.