You are on page 1of 1

CIST 1601 Information Security Fundamentals

Security Information Phase Assignments


Answer the following questions. Use complete sentences and answer each question thoroughly. 1.Using the web, find out who Kevin Mitnick was. What did he do? Who caught him? Write a brief summary of his activities and why he is famous. 2.Consider the statement: an individual threat, like a hacker, can be represented in more than one threat category. If a hacker hacks into a network, copies a few files, defaces the Web page, and steals credit card numbers, how many different threat categories does this attack cover? Name each threat category and why this attack covers each threat. 3.Using the web, determine the extent of Mafiaboy's exploits. How many sites did he compromise and how? How was he caught? 4.The chapter discussed many threats and vulnerabilities to information security. Using the Web, find at least two other sources of information on threat and vulnerabilities. Begin with www.securityfocus.com and search using the keyword threats. List both sources and describe the information available. 5.What does CISSP Stand for? Use the Internet to identify the ethical rules CISSP holders have agreed to follow. Briefly describe the ethical rules for CISSP holders. 6.For what kind of information security jobs does the NSA recruit? Use the Internet to visit their Web page and find out. Briefly describe at least two different NSA information security jobs. 7.Using the resources available in a library, find out what laws Georgia has passed to prosecute computer crime. List at least one Georgia law and briefly explain the computer crimes addressed by this law and include the punishment possibilities. 8.Using a Web browser, go to www.eff.org. What are the current top concerns of this organization? List at least three areas and briefly describe each area.

You might also like