04.10.2016 Views

SEC 280 Complete Case Studies

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>SEC</strong> <strong>280</strong> <strong>Complete</strong> <strong>Case</strong> <strong>Studies</strong><br />

https://hwguiders.com/downloads/sec-<strong>280</strong>-complete-case-studies<br />

<strong>SEC</strong> <strong>280</strong> <strong>Complete</strong> <strong>Case</strong> <strong>Studies</strong><br />

<strong>SEC</strong> <strong>280</strong> Week 1<br />

Your boss has just heard about some nefarious computer activities called ping sweeps and port<br />

scans. He wants to know more about them and what their impact might be on the company.<br />

Write a brief description of what they are, and include your assessment of whether the activities<br />

are something to worry about or not. This assignment requires two to three pages, based upon the<br />

APA style of writing.<br />

<strong>SEC</strong> <strong>280</strong> Week 2<br />

You are the Information Security Officer at a medium-sized company (1,500 employees). The<br />

CIO asks you to explain why you believe it is important to secure the Windows and Unix/Linux<br />

servers from known shortcomings and vulnerabilities. Explain to your CIO what you can do to<br />

make sure the network infrastructure is more secure.<br />

<strong>SEC</strong> <strong>280</strong> Week 3<br />

ABC Institute of Research has sensitive information that needs to be protected from its rivals.<br />

The Institute has collaborated with XYZ Inc. to research genetics. The information must be kept<br />

top secret at any cost. At ABC Institute, the researchers are unsure about the type of key<br />

(asymmetric or symmetric) to use. Please formulate a possible solution, and describe the<br />

advantages and disadvantages of any solution employed.<br />

<strong>SEC</strong> <strong>280</strong> Week 4


Computer security is not an issue for organizations alone. Anyone whose personal computer is<br />

connected to a network or the Internet faces a potential risk of attack. Identify all the potential<br />

security threats on a personal computer. Identify some of the techniques an attacker might<br />

employ to access information on the system.<br />

<strong>SEC</strong> <strong>280</strong> Week 5<br />

You have just been hired as an Information Security Engineer for a large, multi-international<br />

corporation. Unfortunately, your company has suffered multiple security breaches that have<br />

threatened customers’ trust in the fact that their confidential data and financial assets are private<br />

and secured. Credit-card information was compromised by an attack that infiltrated the network<br />

through a vulnerable wireless connection within the organization. The other breach was an inside<br />

job where personal data was stolen because of weak access-control policies within the<br />

organization that allowed an unauthorized individual access to valuable data. Your job is to<br />

develop a risk-management policy that addresses the two security breaches and how to mitigate<br />

these risks.<br />

<strong>SEC</strong> <strong>280</strong> Week 6<br />

Gem Infosys, a small software company, has decided to better secure its computer systems after<br />

a malware attack shut down its network operations for 2 full days. The organization uses a<br />

firewall, three file servers, two Web servers, one Windows 2008 Active Directory server for user<br />

access and authentication, ten PCs, and a broadband connection to the Internet. The management<br />

at Gem needs you to formulate an incident-response policy to reduce network down time if<br />

future incidents occur. Develop an incident-response policy that covers the development of an<br />

incident-response team, disaster-recovery processes, and business-continuity planning.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!