You are on page 1of 3

IAS 101 - Activity 5 – Introduction to Information Security

OBJECTIVES
After this activity, you should be able to:
A. Differentiate information security from information assurance;
B. Explain situations in terms of information security.

MATERIALS
Online references

PROCEDURES
1. Read the instructions for each task below.
2. Answer as concise as possible.
3. Same mode of submission (either type-written or hand-written).
4. Submit via Google Classroom (or via Messenger if you cannot access the GClassroom) on
or before November 27, 2020, at 5:29PM.
5. Those who can submit until Sunday, November, 22, at 11:59PM, will receive
incentive/bonus points. If there is a will, there is a way. 😉
6. Make sure to submit your answers before the deadline BECAUSE WE WILL BE
DISCUSSING THIS THOROUGHLY AS THE TOPIC FOR THE NEXT MEETING.
Part 1. Light research. Follow the instructions below. Cite your sources.
1. Differentiate information security from information assurance.
2. Differentiate threat from attack when talking about information security.

Part 2. Situational analysis. Read the following situations carefully. Provide the
answers to questions. Explain clearly.

Situation 1. 
Suppose that you are a part-time waiter/waitress in the famous foreign bar, Bar
de Social Ciudad y Secundaria (BSCS). One day, a guy in a red coat with a high-tech
pair of eyeglasses, unintentionally left a blank CD on his table after realizing that he is
going to be late for work. Being the nice guy/girl, you kept the CD, hoping that the
customer will immediately come back for it. Three days have gone by, but that guy in
the red coat is yet to come. Out of curiosity, you opened the blank CD in your laptop.
After scanning for virus, you found several hundred Password-protected files and one
“readme.txt” file. You opened the text file since it is the only one which is not password-
protected. The file states:

“Mr. Roger, look at the file in this disk. Make sure to quickly CUT-THEN-
PASTE them to a secured drive. I am hoping that nobody from our company is
ever gonna find out about this. I will be fired for sure. I am expecting your
payment directly to my other bank account. Deal is done. Let’s not see each other
for a while. They are suspicious. I’ll meet you again after three full moons, in the
“place where the sun is silent”.” 

Questions:
1. In your case, what are you going to do after finding out about this? Defend
your answer.
2. What company files do you think are possibly contained in the CD? What gives you
the idea.
3. Is it correct to view the contents of the CD in the first place? Why? Why not?

Situation 2.
You and your wife/husband are both experts in the fields of hardware
development. Unfortunately, you work at the company which is the direct competitor of
your wife’s/husband’s company. One day, your company started to develop a very high-
powered computer processor that allows the booting up to be as fast as 0.5 second
after pressing the power button (Wow!). Since this feature is new, your company stated
that all details about the project is considered as “CLASSIFIED”, meaning, only the
persons involved in the project are allowed to know the details.
One day, while having dinner, your wife/husband suddenly ask, “Love, what’s
going on with your new project? Can you tell me some of the details about it?”
Questions:
1. What will you answer to your significant other? Defend your answer.
2. How is this related to information security?
===End of Task===

“Pikka, pikkaaaaaa! Pikka chu!”


-an inspirational quote by Pikka chu

You might also like