25.07.2013 Views

January 2012 Volume 15 Number 1 - Educational Technology ...

January 2012 Volume 15 Number 1 - Educational Technology ...

January 2012 Volume 15 Number 1 - Educational Technology ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

APPENDIX 2. Taxonomy for Information Security Education<br />

Level Category Assessment criterion<br />

1 Remember What is the definition of information leakage?<br />

What is computer virus?<br />

2 Understand Summarize the given security policy in your own words.<br />

Explain how the password cracking works.<br />

3 Apply Think of three things that could go wrong should your password be compromised.<br />

Follow the guideline to install the PGP tool and create your own asymmetric key pair.<br />

4 Analyze Which of the following network architectures are most dangerous?<br />

Compare and contrast the security functionality of firewall to intrusion detection system.<br />

5 Evaluate Which of the following encrypt algorithms would be more robust? Why?<br />

Is it fair for a company to insist that employees never use their work email for personal<br />

matters?<br />

6 Create Pretend you are an information security officer for a large firm. Write a report about a<br />

recent security incident.<br />

Rewrite a given incident report as a news story.<br />

380

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!