This document contains 8 questions about information security topics for a class assignment. The questions cover: 1) the hacker Kevin Mitnick's activities and why he is famous, 2) how a hypothetical hacker attack covers multiple threat categories, 3) the extent of hacker Mafiaboy's exploits and how he was caught, 4) additional sources of information on threats and vulnerabilities from a given website, 5) what CISSP stands for and the ethical rules CISSP holders agree to follow, 6) the types of information security jobs the NSA recruits for, 7) a Georgia law addressing computer crimes, and 8) the top concerns of the EFF organization and brief descriptions of 3 areas.
This document contains 8 questions about information security topics for a class assignment. The questions cover: 1) the hacker Kevin Mitnick's activities and why he is famous, 2) how a hypothetical hacker attack covers multiple threat categories, 3) the extent of hacker Mafiaboy's exploits and how he was caught, 4) additional sources of information on threats and vulnerabilities from a given website, 5) what CISSP stands for and the ethical rules CISSP holders agree to follow, 6) the types of information security jobs the NSA recruits for, 7) a Georgia law addressing computer crimes, and 8) the top concerns of the EFF organization and brief descriptions of 3 areas.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as RTF, PDF, TXT or read online from Scribd
This document contains 8 questions about information security topics for a class assignment. The questions cover: 1) the hacker Kevin Mitnick's activities and why he is famous, 2) how a hypothetical hacker attack covers multiple threat categories, 3) the extent of hacker Mafiaboy's exploits and how he was caught, 4) additional sources of information on threats and vulnerabilities from a given website, 5) what CISSP stands for and the ethical rules CISSP holders agree to follow, 6) the types of information security jobs the NSA recruits for, 7) a Georgia law addressing computer crimes, and 8) the top concerns of the EFF organization and brief descriptions of 3 areas.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as RTF, PDF, TXT or read online from Scribd
Answer the following questions. Use complete sentences and answer each question thoroughly. 1.Using the web, find out who Kevin Mitnick was. What did he do? Who caught him? Write a brief summary of his activities and why he is famous. 2.Consider the statement: an individual threat, like a hacker, can be represented in more than one threat category. If a hacker hacks into a network, copies a few files, defaces the Web page, and steals credit card numbers, how many different threat categories does this attack cover? Name each threat category and why this attack covers each threat. 3.Using the web, determine the extent of Mafiaboy's exploits. How many sites did he compromise and how? How was he caught? 4.The chapter discussed many threats and vulnerabilities to information security. Using the Web, find at least two other sources of information on threat and vulnerabilities. Begin with www.securityfocus.com and search using the keyword threats. List both sources and describe the information available. 5.What does CISSP Stand for? Use the Internet to identify the ethical rules CISSP holders have agreed to follow. Briefly describe the ethical rules for CISSP holders. 6.For what kind of information security jobs does the NSA recruit? Use the Internet to visit their Web page and find out. Briefly describe at least two different NSA information security jobs. 7.Using the resources available in a library, find out what laws Georgia has passed to prosecute computer crime. List at least one Georgia law and briefly explain the computer crimes addressed by this law and include the punishment possibilities. 8.Using a Web browser, go to www.eff.org. What are the current top concerns of this organization? List at least three areas and briefly describe each area.
Cyber Security for Beginners: How to Protect Your Devices from Malicious Attacks Using Risk Management, Social Engineering, and Information Security (2022 Guide for Newbies)