Posted: Sun Apr 22, 2007 9:52 pm
I have done a lot of stuff for this assignment but Im running out of time with a lot more things to do. So since we have a lot of tech experts here such as WAI and Uber, I thought I'd give posting these questions that I have left to do over here for some help with answering them.
Bullet points and suggestions will really help. So those who can thanks.
These are the questions that are left.
1. The case from the textbook:
HENRY MAGRUDER made a mistake: he left a CD at the coffee station. Later, Iris Brown was at the coffee station, topping off her coffee cup, hoping to wrap up her work on the current SQL code module before it was time to go home. As she turned to leave, she saw the unlabeled CD on the counter. Being the helpful sort, she picked it up, intending to return it to the person who'd left it behind.
Expecting to find perhaps the latest device drivers, or someone's work from the development team's office, Iris slipped the disk into the drive of her computer and ran a virus scan against its contents. She then opened the file explorer program. She had been correct in assuming the CD contained data files, lots of them. She opened a file at random, and names, addresses, and Social Security numbers scrolled down her screen. These were not the test records she expected; instead they looked more like critical payroll data. Concerned, she found a readme.txt file and opened it. It read:
Jill, see files on this disc. Hope they meet your expectations. Wire money to my account as arranged. Rest of data sent on payment.
Iris realized that someone was selling sensitive company data to an outside information broker. She looked back at the directory listing and saw that the files spanned the range of every department at Sequential Label and Supply-everything from customer lists to shipping invoices. She saw one file that she knew contained the credit card numbers for every Web customer the company supplied. She opened another file and saw that it stopped about halfway through the data. Whoever did this had split the data into two parts. That made sense: payment on delivery of the first half.
Now, who did this belong to? She opened up the file properties option on the readme.txt file. The file owner was listed as 'hmagruder.' That must be Henry Magruder, the developer two cubes over in the next aisle. Iris pondered her next action.
Assume, the above story took place in Auckland, New Zealand.
Answer two INDEPENDENT questions:
oWhat would be your next step in the Iris™s situation?
oWhat would you do as an IT manager in terms of handling such situations?
Note that the answer to each of these questions may not necessary be the same.
2.
Information Security Policy is perhaps the most important document outlining rules of safe computing within a business organization. Your boss gave you request to prepare such a document for your company. Which issues should be addresses in such a document and why? Take a note that this question is not about the rules itself (like œAll the files must be protected by a password) but rather about existence of such rules (œThere are rules regulating methods of accessing computer files).
Assume that the organization is a typical Microsoft installation having several LANs communicating via virtual channels plus extensive set of WEB facilities used by the contractors and clients for conducting online transactions with the company. Also broadband facilities for the top management have been installed.
3.
There is a file encrypted with triple DES cipher and using 128 bit key. Then the same file was encrypted using RSA asymmetric cipher with a public key of the same length. Which encrypted file would be more difficult to break and by what factor? Explain your reasoning.
4.
The case:
Jerry Babcock, president of Babcock Poultry Company, located in Hamilton, NZ, is a regional supplier of poultry products covering the whole North Island.
Recently, Mr. Babcock converted his record-keeping operations from a manual process that was done by production workers in the processing plant to a computerized process completed by bar coding and scanners. Everything was working out very well, and Mr. Babcock was extremely pleased with the up-to-date, thorough reports made available to key managers.
Recently, Mr. Babcock has noticed, however, that one of the managers is making copies of files and additional printouts on a regular basis. Mr. Babcock was able to determine, after watching this manager for several weeks, that one of the items he was leaving with was a copy of customers, sales volumes, suppliers, etc. This information could be extremely valuable to a competitor.
1.How could this problem have been avoided?
2.How could Mr. Babcock determine what the manager was doing with the information?
3.What course of action should be followed-fire the manager, confront the manager, tighten up the system, etc.?
5. The case
Allison Roderick, president of Roderick Design Systems, located in Auckland, NZ, has been reading in newspapers and magazines and hearing on TV about the spread of viruses throughout computer systems. Her firm is an organization that distributes unique office layout designs for corporate offices in North Island area. In most cases, the designs are custom-fit to each client and take a great deal of time and effort to create. The client usually sets strict completion deadlines, so time is of the essence as the project nears completion. (Otherwise, RDS must assume a substantial completion penalty.) Ms. Roderick does not want the "messiness" and inconvenience of a virus entering the organization's computers and designs, shutting down the system or altering data in any way. She has decided to call in a well-known computer security expert as a consultant to assess the organization's current risk and to set up a workable virus protection program.
What criteria should Ms. Roderick adopt in working with the consultant so that the situation can be assessed quickly, efficiently, and at a reasonable cost?
6.
The steps of the login spoof attack using such a program can be summarized as follows:
1.The attacker gains physical access to the target individual's computer terminal (perhaps after target has gone home).
2.The attacker logs onto the target computer system using whatever login and password are available to the attacker (if the attacker is an insider, then they could be his own). It is possible to use a different target computer system than the one the target individual uses, but this requires that certain procedures be changed.
3.The Trojan horse spoof program is left on the terminal for the target individual. The program is usually disguised to look as normal as possible (e.g., by dimming the screen intensity).
Develop a system preventing such spoof attacks.
Bullet points and suggestions will really help. So those who can thanks.
These are the questions that are left.
1. The case from the textbook:
HENRY MAGRUDER made a mistake: he left a CD at the coffee station. Later, Iris Brown was at the coffee station, topping off her coffee cup, hoping to wrap up her work on the current SQL code module before it was time to go home. As she turned to leave, she saw the unlabeled CD on the counter. Being the helpful sort, she picked it up, intending to return it to the person who'd left it behind.
Expecting to find perhaps the latest device drivers, or someone's work from the development team's office, Iris slipped the disk into the drive of her computer and ran a virus scan against its contents. She then opened the file explorer program. She had been correct in assuming the CD contained data files, lots of them. She opened a file at random, and names, addresses, and Social Security numbers scrolled down her screen. These were not the test records she expected; instead they looked more like critical payroll data. Concerned, she found a readme.txt file and opened it. It read:
Jill, see files on this disc. Hope they meet your expectations. Wire money to my account as arranged. Rest of data sent on payment.
Iris realized that someone was selling sensitive company data to an outside information broker. She looked back at the directory listing and saw that the files spanned the range of every department at Sequential Label and Supply-everything from customer lists to shipping invoices. She saw one file that she knew contained the credit card numbers for every Web customer the company supplied. She opened another file and saw that it stopped about halfway through the data. Whoever did this had split the data into two parts. That made sense: payment on delivery of the first half.
Now, who did this belong to? She opened up the file properties option on the readme.txt file. The file owner was listed as 'hmagruder.' That must be Henry Magruder, the developer two cubes over in the next aisle. Iris pondered her next action.
Assume, the above story took place in Auckland, New Zealand.
Answer two INDEPENDENT questions:
oWhat would be your next step in the Iris™s situation?
oWhat would you do as an IT manager in terms of handling such situations?
Note that the answer to each of these questions may not necessary be the same.
2.
Information Security Policy is perhaps the most important document outlining rules of safe computing within a business organization. Your boss gave you request to prepare such a document for your company. Which issues should be addresses in such a document and why? Take a note that this question is not about the rules itself (like œAll the files must be protected by a password) but rather about existence of such rules (œThere are rules regulating methods of accessing computer files).
Assume that the organization is a typical Microsoft installation having several LANs communicating via virtual channels plus extensive set of WEB facilities used by the contractors and clients for conducting online transactions with the company. Also broadband facilities for the top management have been installed.
3.
There is a file encrypted with triple DES cipher and using 128 bit key. Then the same file was encrypted using RSA asymmetric cipher with a public key of the same length. Which encrypted file would be more difficult to break and by what factor? Explain your reasoning.
4.
The case:
Jerry Babcock, president of Babcock Poultry Company, located in Hamilton, NZ, is a regional supplier of poultry products covering the whole North Island.
Recently, Mr. Babcock converted his record-keeping operations from a manual process that was done by production workers in the processing plant to a computerized process completed by bar coding and scanners. Everything was working out very well, and Mr. Babcock was extremely pleased with the up-to-date, thorough reports made available to key managers.
Recently, Mr. Babcock has noticed, however, that one of the managers is making copies of files and additional printouts on a regular basis. Mr. Babcock was able to determine, after watching this manager for several weeks, that one of the items he was leaving with was a copy of customers, sales volumes, suppliers, etc. This information could be extremely valuable to a competitor.
1.How could this problem have been avoided?
2.How could Mr. Babcock determine what the manager was doing with the information?
3.What course of action should be followed-fire the manager, confront the manager, tighten up the system, etc.?
5. The case
Allison Roderick, president of Roderick Design Systems, located in Auckland, NZ, has been reading in newspapers and magazines and hearing on TV about the spread of viruses throughout computer systems. Her firm is an organization that distributes unique office layout designs for corporate offices in North Island area. In most cases, the designs are custom-fit to each client and take a great deal of time and effort to create. The client usually sets strict completion deadlines, so time is of the essence as the project nears completion. (Otherwise, RDS must assume a substantial completion penalty.) Ms. Roderick does not want the "messiness" and inconvenience of a virus entering the organization's computers and designs, shutting down the system or altering data in any way. She has decided to call in a well-known computer security expert as a consultant to assess the organization's current risk and to set up a workable virus protection program.
What criteria should Ms. Roderick adopt in working with the consultant so that the situation can be assessed quickly, efficiently, and at a reasonable cost?
6.
The steps of the login spoof attack using such a program can be summarized as follows:
1.The attacker gains physical access to the target individual's computer terminal (perhaps after target has gone home).
2.The attacker logs onto the target computer system using whatever login and password are available to the attacker (if the attacker is an insider, then they could be his own). It is possible to use a different target computer system than the one the target individual uses, but this requires that certain procedures be changed.
3.The Trojan horse spoof program is left on the terminal for the target individual. The program is usually disguised to look as normal as possible (e.g., by dimming the screen intensity).
Develop a system preventing such spoof attacks.