1. (TCO A) List and assess at least three kinds of damage a company could suffer when
the integrity of a program or company data are compromised. (A description of
damage, not a definition of data integrity, is required.) (Points : 40)
2. (TCO B) Suppose you have a high capacity network connection coming into your
home, and you also have a wireless network access point. Also, suppose you do not
use the full capacity of your network connection. List and assess four reasons why
you might still want to prevent an outsider obtaining free network access by
intruding into your wireless network. (Points : 40)
- Exposure of your personal information such as bank account information, passwords that
are saved onto the computer and any credit card information that may be saved on the
computer.
- Potential for modification of your data. If someone hacks into your network, then they could place
viruses and other malware onto it.
- Potential flooding you your network limiting your own access. If a person gets onto your network
and uses your server that would lag on your end while being online at the same time as the person
who hacked into your system.
- Potential for illegal activities being attributed to your account. For example, if another person
hacks into your network and uses this for illegal activities, child pornographic material, stealing
others information, all of which may hold the person liable where the IP address originates.
3. 3. (TCO C) Wkh dqvzhu wr wklv txhvwlrq lv hdvb. What is the plaintext? What
cipher was used? Assess whether this would be good for today's security
programs. If not, what would be good to use and why? (Points : 40)
4. (TCO D) You have been asked to give a presentation to a law school class on digital
crime. After the presentation, a student asks why so few people are actually
prosecuted for computer crime when these crimes seem to be happening all the
time. Give a five-point outline of your response to this question. Assess the impact
on preventing crimes from your perspective given these issues. (Points : 40)
The four authentication policies are Encryption, Firewalls, Host-Based
Authentication, and Constrained User Interfaces. The four authentication policies
that cannot be controlled by technology are fingerprint, iris, voice pattern, and
face. These four are strictly based off the physical person.
Technical Controls - Computer Security Resource Center. (n.d.). Technical
Controls - Computer Security Resource Center., http://www.google.com/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=3&cad=rja&uact=8&ved=0CD4QFjAC&url
=http%3A%2F%2Fcsrc.nist.gov%2Fgroups%2FSMA%2Ffasp%2Fdocuments
%2Fpolicy_procedure%2Ftechnical-controls-
policy.doc&ei=n41JVM72F63LsASOq4C4DQ&usg=AFQjCNEasUaSjwGdz
This study source was downloaded by 100000861168648 from CourseHero.com on 03-08-2023 05:19:00 GMT -06:00
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller faithnzuna. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $8.49. You're not tied to anything after your purchase.