Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITS 3210 Chapter 3 - What Would You Do.

Beoordeling
-
Verkocht
-
Pagina's
2
Cijfer
A+
Geüpload op
21-06-2021
Geschreven in
2020/2021

1. You and your team have been hired to assess the computer security of a small retailer. Where would you begin your assessment? What would you look for? a. I would begin by examining the permissions and security surrounding the database servers, firewalls, and web application server in use by the company. I would also look for any open ports, unneeded access, and public facing interfaces. 2. It appears that someone is using your firm’s corporate directory—which includes job titles, email addresses, and phone numbers—to contact senior managers and directors via text message. The text message requests that the recipient click on a URL, which leads to a website that looks as if it were designed by your human resources organization. Once at this phony website, the employees are asked to enter their bank routing number and account number to be used for electronic deposit of their annual bonus check. You are a member of the IT security group for the firm. What can you do? a. I would put out a memo letting the team know that a phishing attempts going around, and to not click on any suspicious links and to report these suspicious links to IT. I would then remove the upper management cellular numbers from the directory, and attempt to look through the logs for any suspicious access attempts to the directory itself. 3. You are the manager of the IT organization of a small business. The owner calls you late one night and tells you that she just received an anonymous call demanding payment of $10,000 or the company’s customer database will be encrypted and made inaccessible by a logic bomb that has already been planted in the firm’s billing system. What do you say? What can you do? a. I would tell her not to pay it. Immediately pull any back up servers offline to save the information just in case they really do go through with the logic bomb. I would then pull the system off the network for the period that they say they will enact it. 4. Your classmate tells you that he has been working all semester to create a blended threat and that he plans to test it against the university’s computer systems this weekend. What do you say? a. Tell him that I don’t want to know what he plans on doing, and that he should not go through with it. If he does go through with it and the system is compromised and they start to investigate I would tell the truth and admit who initiated the attack

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

Chapter 3 – What Would You Do

Farah Zoma

1. You and your team have been hired to assess the computer security of a small retailer. Where
would you begin your assessment? What would you look for?
a. I would begin by examining the permissions and security surrounding the database
servers, firewalls, and web application server in use by the company. I would also look
for any open ports, unneeded access, and public facing interfaces.
2. It appears that someone is using your firm’s corporate directory—which includes job titles, email
addresses, and phone numbers—to contact senior managers and directors via text message. The
text message requests that the recipient click on a URL, which leads to a website that looks as if
it were designed by your human resources organization. Once at this phony website, the
employees are asked to enter their bank routing number and account number to be used for
electronic deposit of their annual bonus check. You are a member of the IT security group for the
firm. What can you do?




m
a. I would put out a memo letting the team know that a phishing attempts going around,




er as
and to not click on any suspicious links and to report these suspicious links to IT. I would




co
then remove the upper management cellular numbers from the directory, and attempt




eH w
to look through the logs for any suspicious access attempts to the directory itself.




o.
3. You are the manager of the IT organization of a small business. The owner calls you late one
rs e
night and tells you that she just received an anonymous call demanding payment of $10,000 or
ou urc
the company’s customer database will be encrypted and made inaccessible by a logic bomb that
has already been planted in the firm’s billing system. What do you say? What can you do?
a. I would tell her not to pay it. Immediately pull any back up servers offline to save the
o

information just in case they really do go through with the logic bomb. I would then pull
aC s


the system off the network for the period that they say they will enact it.
vi y re


4. Your classmate tells you that he has been working all semester to create a blended threat and
that he plans to test it against the university’s computer systems this weekend. What do you
say?
a. Tell him that I don’t want to know what he plans on doing, and that he should not go
ed d




through with it. If he does go through with it and the system is compromised and they
ar stu




start to investigate I would tell the truth and admit who initiated the attack.
5. You are one of the top students in your university’s computer science program of 100 students,
and you have agreed to meet with a recruiter from the Department of Homeland Security. Over
is




dinner, he talks to you about the increasing threat of cyberterrorist attacks launched on the
United States by foreign countries and the need to counter those attacks. The agency has a
Th




strong need for people who can both develop and defend against zero day exploits that could be
used to plant malware in the software used by the government and military computers. At the
end of the dinner, the recruiter asks, “Would such a role be of interest to you?” How do you
sh




respond?
a. That I would be very interested in such an opportunity and to be able to increase my
knowledge regarding something that is not readily available to the public. Plus it would
look amazing on my resume.
6. You are a computer security trainer for your firm’s 200 employees and contract workers. What
are the key topics you would cover in your initial half-hour basic training program on security for



This study source was downloaded by 100000793680026 from CourseHero.com on 06-21-2021 05:40:44 GMT -05:00


https://www.coursehero.com/file/40922854/Chapter-3-What-Would-You-Dodocx/

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
21 juni 2021
Aantal pagina's
2
Geschreven in
2020/2021
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Beschikbare oefenvragen

€7,06
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Examhack Stanford University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
300
Lid sinds
4 jaar
Aantal volgers
238
Documenten
999
Laatst verkocht
5 dagen geleden
EASY A GRADE!!

Here, you will find simple, articulate well-researched education material for you. .... ALL WORK HAS PASSED WITHOUT NEEDING REVISIONS AND BY THE RUBRIC.

3,8

61 beoordelingen

5
31
4
11
3
5
2
4
1
10

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen