Discuss the information stored in personal computer


Assignment:

1. Assume that a security model is needed to protect information used in the class you are taking-say, the information in your course's learning management system. Use the CNSS model to identify each of the 27 cells needed for complete information protection. Write a brief statement that explains how you would address the components represented in each of the 2 to 7 cells.

2. Consider the information stored in your personal computer. Do you currently have information stored in your computer that is critical to your Personal life? If that information became compromissed or lost, what effect would It have on you?

3. Using the Web, research Stuxent. When was it discovered? What kind of systems does it target? Who created it and what is it used for?

4. Search the Web for "The Official Phreaker's Manual." What information in this manual might help a security administratior to protect a communication system.

5. The chapter discussed many threats and vulnerabilities to information security. Using teh web, find at least two other sources of information about treats and vulnerabilities. Began with www. securityfocus.com and use a keyword search on "treats".

6. Using the categories of treats mentioned in this chapter and the various attacks described, review several current media sources and identify examples of each treats.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Discuss the information stored in personal computer
Reference No:- TGS03020128

Now Priced at $45 (50% Discount)

Recommended (96%)

Rated (4.8/5)