Question 1 You have recently been offered an intern position in your tertiary instution as a junior Computer Lab supervisor. Your manager wants you to take a leading role in managing the computer lab, in particular, security data, applications and the network. Your manager requested you to explain the categories of attackers to everyone that will be attending the next staff meeting. In preparation of this, answer the following questions: Q.1.1 Using the Computer Lab scenario above, provide one example of an attack that each of the attackers (A – C below) could use to attack/compromise the computer lab data, applications, or network security. Attacker Type Example A. Hackavists B. Script kiddies C. Insiders Q.1.2 Describe how you would use any two security principles to defend against any of the attacks you mentioned in Q.1.1 above. Q.1.3 For the following concept, provide a definition and a suitable example. Include the information security implication as well in your answer. • Thwarting identity theft.
Question 1
You have recently been offered an intern position in your tertiary instution as a junior Computer
Lab supervisor. Your manager wants you to take a leading role in managing the computer lab, in
particular, security data, applications and the network.
Your manager requested you to explain the categories of attackers to everyone that will be
attending the next staff meeting. In preparation of this, answer the following questions:
Q.1.1 Using the Computer Lab scenario above, provide one example of an attack that
each of the attackers (A – C below) could use to attack/compromise the computer
lab data, applications, or network security.
Attacker Type Example
A. Hackavists
B. Script kiddies
C. Insiders
Q.1.2 Describe how you would use any two security principles to defend against any of
the attacks you mentioned in Q.1.1 above.
Q.1.3 For the following concept, provide a definition and a suitable example. Include
the
• Thwarting identity theft.
Step by step
Solved in 2 steps