![]() Description Attackers from anywhere in the world can send attacks Attackers can launch attacks against millions of computers within minutes. Write a one-page paper about these experiences. Write a one-paragraph analysis of your finding Show transcribed image text Case Project 1-1: Personal Attack Experiences? What type of computer attack have you (or a friend or another student) experienced? When did it happen? What type of computer or device was involved? What type of damage did it inflict? What had to be done to clean up following the attack? How was the computer fixed after the attack? What could have prevented it? Using the information in Table 1, list the reason or reasons you think that the attack was successful. Based on your analysis, what can you say regarding the security of these computers? Finally, for each of the elements that you think is inadequate or missing, add what you believe would improve security. Leave blank any box for which that security layer does not exist. Then enter the security element of each principle for each of the computers (such as, for Limiting you may indicate the number of people who have keys to the door of the office or apartment that contains the computer). ![]() ![]() Create a table that lists the five fundamental security principles across the top, and then list down the side at least three computers that you commonly use at school, your place of employment, home, a friend's house, etc. Analyze these principles for the computers that you use. User confusion Case Project 1-2: What Are Your Layers? Security defenses should be based on five fundamental security principles: layering, limiting, diversity, obscurity, and simplicity. Users are required to make difficult security decisions with little or no instruction. Attackers use thousands of computers in an attack against a single computer or network Delays in security updating Weak security update distribution Distributed attacks Use of personal devices Enterprises are having difficulty providing security for a wide array of personal devices. Many software products lack a means to distribute security updates in a timely fashion. Reason Universally connected devices Increased speed of attacks Greater sophistication of attacks Availability and simplicity of attack tools Faster detection of vulnerabilities Attackers can discover security holes in hardware or software more quickly Vendors are overwhelmed trying to keep pace updating their products against the latest attacks. Attacks are no longer limited to highly skilled attackers. Attack tools vary their behavior so the same attack appears differently each time. Case Project 1-1: Personal Attack Experiences? What type of computer attack have you (or a friend or another student) experienced? When did it happen? What type of computer or device was involved? What type of damage did it inflict? What had to be done to clean up following the attack? How was the computer fixed after the attack? What could have prevented it? Using the information in Table 1, list the reason or reasons you think that the attack was successful.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |