COMP1806 – Information Security
Tutorial 1: Fundamentals of Information Security
Friday, October 25, 2010
Please attempt all exercises. Feel free to ask us questions at any time but it is advisable to attempt
on your own to resolve issues. You may leverage this opportunity to work more independently and
thoroughly analyse problems. Use the same word document file and keep it for your records when
you revise for the module assessment.
Exercise 1: Mapping News to Lecture
Using a library with current periodicals, find a recent news article about a topic related to
information security. Write a one- to two-page review of the article and how it is related to the
principles of information security introduced in the lecture today.
Exercise 2: CIA
Using google, find 3 different cyber-attacks occurred within the last 3 years, in which the adversaries
breached Confidentiality, Integrity and Availability (CIA) of the system. Discuss which CIA property
was breached in each of these attacks.
Exercise 3: CISO
Using the Internet, find a recent feature article about a CISO or other IT professional with CISO job
functions. Write a short summary of that individual and how he or she came to hold that position.
The publications ComputerWorld and Information Week often have these kinds of features.
Tutorial 1: Fundamentals of Information Security
Friday, October 25, 2010
Please attempt all exercises. Feel free to ask us questions at any time but it is advisable to attempt
on your own to resolve issues. You may leverage this opportunity to work more independently and
thoroughly analyse problems. Use the same word document file and keep it for your records when
you revise for the module assessment.
Exercise 1: Mapping News to Lecture
Using a library with current periodicals, find a recent news article about a topic related to
information security. Write a one- to two-page review of the article and how it is related to the
principles of information security introduced in the lecture today.
Exercise 2: CIA
Using google, find 3 different cyber-attacks occurred within the last 3 years, in which the adversaries
breached Confidentiality, Integrity and Availability (CIA) of the system. Discuss which CIA property
was breached in each of these attacks.
Exercise 3: CISO
Using the Internet, find a recent feature article about a CISO or other IT professional with CISO job
functions. Write a short summary of that individual and how he or she came to hold that position.
The publications ComputerWorld and Information Week often have these kinds of features.