Question 1 You have recently been offered an intern position in your tertiary instution as a junior Computer Lab supervisor. Your manager wants you to take a leading role in managing the computer lab, in particular, security data, applications and the network. Your manager requested you to explain the categories of attackers to everyone that will be attending the next staff meeting. In preparation of this, answer the following questions: Q.1.1 Using the Computer Lab scenario above, provide one example of an attack that each of the attackers (A – C below) could use to attack/compromise the computer lab data, applications, or network security. Attacker Type Example A. Hackavists B. Script kiddies C. Insiders Q.1.2 Describe how you would use any two security principles to defend against any of the attacks you mentioned in Q.1.1 above. Q.1.3 For the following concept, provide a definition and a suitable example. Include the information security implication as well in your answer. • Thwarting identity theft.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Question 1
You have recently been offered an intern position in your tertiary instution as a junior Computer
Lab supervisor. Your manager wants you to take a leading role in managing the computer lab, in
particular, security data, applications and the network.
Your manager requested you to explain the categories of attackers to everyone that will be
attending the next staff meeting. In preparation of this, answer the following questions:
Q.1.1 Using the Computer Lab scenario above, provide one example of an attack that
each of the attackers (A – C below) could use to attack/compromise the computer
lab data, applications, or network security.
Attacker Type Example
A. Hackavists
B. Script kiddies
C. Insiders

Q.1.2 Describe how you would use any two security principles to defend against any of
the attacks you mentioned in Q.1.1 above.

Q.1.3 For the following concept, provide a definition and a suitable example. Include
the information security implication as well in your answer.
• Thwarting identity theft.

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education