You are on page 1of 1

Module 2 Assignment F o r mo d u le # 2 , yo u w i l l n e e d t o co mp le t e fo l lo w i n g : C ha p t e r 2 - T h e N e e d fo r S e c u r it y: s u b m it e xe r c is e s # 1 , 3 , a n d 4 .

t h e

1. Consider the statement: an individual threat, like a hacker, can be represented in more than one threat category. If a hacker hacks into a network, copies a few files, defaces the Web page, and steals credit card numbers, how many different threat categories does this attack cover? A hacker is deliberately trying to hack into a network is viewed as espionage or trespassing, coping files can also be counted as espionage or theft. Compromises to intellectual property due to copyright infringement by defacing the web page and stealing credit card numbers. Technical software failures, if the company had a secure fire wall that prevented code problems and a hacker attacking through unknown loopholes. Also there is the threat of management. If management was not thorough and sufficient in protecting the hardware the hacker would not have been able to hack into the system 3. Search the web for the The Official Phreakers Manual. What information contained in this manual can help a security administrator to protect a communications system.

work cited

4. The chapter discussed many threats to information security. Using the Web, find at least two other sources of information on threats and vulnerabilities. Begin with and use a keyword search on "threads".

Chapter 3- Legal, Ethical, and Professional Issues in Information Security: submit exercises # 1, 2, and 4. 1. What does CISSP stand for? Use the Internet to identify the ethical rules CISSP holders have agreed to follow. 2. For what kind of information security jobs does the NSA recruit? Use the Internet to visit their Web page and find out. 4. Using the web, go to What are the current top concerns of this organization? S u b m it yo u r a s s ig n m e n t vi a t h e Dr o p b o x l a t e r t h a n S u n d a y 1 1 : 5 9 P M E S T / E D T. n o