SEC 280 Complete Case Studies
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>SEC</strong> <strong>280</strong> <strong>Complete</strong> <strong>Case</strong> <strong>Studies</strong><br />
https://hwguiders.com/downloads/sec-<strong>280</strong>-complete-case-studies<br />
<strong>SEC</strong> <strong>280</strong> <strong>Complete</strong> <strong>Case</strong> <strong>Studies</strong><br />
<strong>SEC</strong> <strong>280</strong> Week 1<br />
Your boss has just heard about some nefarious computer activities called ping sweeps and port<br />
scans. He wants to know more about them and what their impact might be on the company.<br />
Write a brief description of what they are, and include your assessment of whether the activities<br />
are something to worry about or not. This assignment requires two to three pages, based upon the<br />
APA style of writing.<br />
<strong>SEC</strong> <strong>280</strong> Week 2<br />
You are the Information Security Officer at a medium-sized company (1,500 employees). The<br />
CIO asks you to explain why you believe it is important to secure the Windows and Unix/Linux<br />
servers from known shortcomings and vulnerabilities. Explain to your CIO what you can do to<br />
make sure the network infrastructure is more secure.<br />
<strong>SEC</strong> <strong>280</strong> Week 3<br />
ABC Institute of Research has sensitive information that needs to be protected from its rivals.<br />
The Institute has collaborated with XYZ Inc. to research genetics. The information must be kept<br />
top secret at any cost. At ABC Institute, the researchers are unsure about the type of key<br />
(asymmetric or symmetric) to use. Please formulate a possible solution, and describe the<br />
advantages and disadvantages of any solution employed.<br />
<strong>SEC</strong> <strong>280</strong> Week 4
Computer security is not an issue for organizations alone. Anyone whose personal computer is<br />
connected to a network or the Internet faces a potential risk of attack. Identify all the potential<br />
security threats on a personal computer. Identify some of the techniques an attacker might<br />
employ to access information on the system.<br />
<strong>SEC</strong> <strong>280</strong> Week 5<br />
You have just been hired as an Information Security Engineer for a large, multi-international<br />
corporation. Unfortunately, your company has suffered multiple security breaches that have<br />
threatened customers’ trust in the fact that their confidential data and financial assets are private<br />
and secured. Credit-card information was compromised by an attack that infiltrated the network<br />
through a vulnerable wireless connection within the organization. The other breach was an inside<br />
job where personal data was stolen because of weak access-control policies within the<br />
organization that allowed an unauthorized individual access to valuable data. Your job is to<br />
develop a risk-management policy that addresses the two security breaches and how to mitigate<br />
these risks.<br />
<strong>SEC</strong> <strong>280</strong> Week 6<br />
Gem Infosys, a small software company, has decided to better secure its computer systems after<br />
a malware attack shut down its network operations for 2 full days. The organization uses a<br />
firewall, three file servers, two Web servers, one Windows 2008 Active Directory server for user<br />
access and authentication, ten PCs, and a broadband connection to the Internet. The management<br />
at Gem needs you to formulate an incident-response policy to reduce network down time if<br />
future incidents occur. Develop an incident-response policy that covers the development of an<br />
incident-response team, disaster-recovery processes, and business-continuity planning.