CISC180 - Project 1

docx

School

Northampton County Area Community College *

*We aren’t endorsed by this school

Course

180

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

3

Uploaded by HighnessMeerkat3580

Report
CISC180 – Project 1 Keep in mind that information constantly changes on the Internet. If a URL is not working, try running a Google search. Complete the questions and/or tasks and submit this document under week 1 dropbox by next week. Project 1: Examining Data Breaches—Visual In this project, you view the biggest data breaches resulting in stolen information through a visual format. 1. Open your web browser and enter the URL http://www.informationisbeautiful.net /visualizations/worlds-biggest-data-breaches-hacks/ (if you are no longer able to access the site through this web address, use a search engine to search for “Information Is Beautiful World’s Biggest Data Breaches." 2. Click Hide Filter to display a visual graphic of the data breaches, as shown in Figure 1. Figure 1 World’s biggest data breaches Source: Information is Beautiful 3. Scroll down the page to view the data breaches. Note that the size of the breach is indicated by the size of the bubble. 4. Scroll back up to the top and note the color of the bubbles that have an “Interesting Story.” Click one of the bubbles and read the story. 5. Click Read a bit more. 6. Click to see the original report. 7. Read about the data breach. When finished, close only this tab in your browser. 8. Click Show Filter to display the filter menu. 9. Under Organization, click Government
10. Under Method of Leak, click All. 11. Click one of the bubbles and read the story. 12. Uncheck Government. Under Organization, now click Tech to see the breaches that have targeted the technology industry. Click one of the bubbles and read the story. 13. At the top of the graphic, click Method of Leak so that the bubbles display how the leak occurred. Q: Which type of leak is the most common? Q: Why do you think this is the case? 14. Create your own filters to view different types of breaches. Q: Does this graphic convey a better story than the text-based data would? Q: How does this visualization help you with the understanding of threats? 15. Close all windows. _________________________________________________________________ Case Project 2: What Are Your Layers? Security defenses should be based on five fundamental security principles: layering, limiting, diversity, obscurity, and simplicity. http://tgzzz.blogspot.com/2011/02/comtia-sec-basics.html 1. Analyze these principles for the computers that you use. 2. Create a table that lists the five fundamental security principles across the top, and then list down the side at least three computers that you commonly use at school, your place of employment, home, a friend’s house, etc. 3. Then enter the security element of each principle for each of the computers (such as, for Limiting you may indicate the number of people who have keys to the door of the office or apartment that contains the computer). Leave blank any box for which that security layer does not exist. Q: Based on your analysis, what can you say regarding the security of these computers? Q: Finally, for each of the elements that you think is inadequate or missing, add what you believe would improve security. In addition to your table, write a one-paragraph analysis of your findings.
____________________________________________________________________ Case Project 3: Preventing Attacks Many attacks could have been prevented if companies were following the five security principles above. Read this article about the recent T-Mobile breach: https://krebsonsecurity.com/2021/08/t-mobile-breach-exposed-ssn-dob-of-40m-people/ How could the attack have been prevented if the five fundamental security principles—layering, limiting, diversity, obscurity, and simplicity—had been applied? Create a table that lists each of these security principles and how they could have been used to mitigate the attack. You may need to be creative in your thinking. ____________________________________________________________________ Case Project 4: Security Frameworks and Architectures There are several security frameworks and architectures available to use as templates for creating a secure environment. These include ISO, NIST, COBIT, ETSI, RFC, and ISA/IEC. Select three security frameworks/architectures and use the Internet to research each of them. Questions to think about: 1. How are they predominately used? 2. What are their strengths? 3. What are their weaknesses? 4. Are they general or specific? 5. What is a setting (small business, school, home office, etc.) that you would recommend for each of these?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help