IT10 Module1 Melendres
IT10 Module1 Melendres
E. Assessment:
I. Essay:
- MULTICS
12.What is the relationship between the MULTICS project and the early
development of computer security?
I. Exercises:
1. Consider the information stored on your personal computer. For
each of the terms listed, find an example and document it: threat, threat
agent, vulnerability, exposure, risk, attack, and exploit.
2. Using the Web, identify the chief information officer, chief
information security officer, and systems administrator for your school.
Which of these individuals represents the data owner? Data custodian?
3. Using the Web, find out more about Kevin Mitnick. What did he
do? Who caught him? Write a short summary of his activities and explain
why he is infamous.
Questions:
1. Do you think this event was caused by an insider or outsider? Why
do you think this?
- I believe that this could go both ways this could of came from an insider by
maybe starting a virus from plugging in a USB flash drive that may could
have been infected by a worm or virus. Also I say this could of came from
the outside because one of the employees could of open at email which
contains Virus or worm which they would receive from an outsider.
2. Other than installing virus and worm control software, what can SLS
do to prepare for the next incident?
- This company should put an industry standard firewall into their corporate
computer operation system Also they can try updated the latest antivirus
software so there able to fight often any new
3. Do you think this attack was the result of a virus or a worm? Why do
you think this?
- I think the result of this attach may be virus but not worm. Because this
attach identified is a security issue which can cause by a virus but worm.