[SOLVED] Week 2 Tutorial Sheet

$25

File Name: Week_2_Tutorial_Sheet.zip
File Size: 197.82 KB

5/5 - (1 vote)

Week 2 Tutorial Sheet
Introduction to Cyber Security
IMPORTANT NOTES: Study lecture materials at least 1 hour and prepare Question 1-4 prior to the tutorial session. Those questions will be discussed in the tutorial.
1. Distinguish or define the following terms within the context of security: Vulnerability, Threat and Control.

Copyright By Assignmentchef assignmentchef

2. Categorise the type of security threats (or attacks) to computers/distributed systems/computer networks by the type of security goal that is breached.
3. Give an example to each of the above category can be your own personal computer, corporate computer systems such as Monash University, etc. Relate those threats to hardware/software/data as applied to corporate computer systems.
4. What are the differences between passive attack and active attack?
5. Describe different types of passive attacks and active attacks.
6. For each of the following example systems, state the security goal you think is most important and rank in order of imporance any other relevant goals, giving your reasoning: (1) online banking, (2) bureau of meterology weather forecast website, (3) military intelligence database.

CS: assignmentchef QQ: 1823890830 Email: [email protected]

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Shopping Cart
[SOLVED] Week 2 Tutorial Sheet
$25