top of page

ACTIVITIES

ACTIVITY NO1: Case Study

Essay

Questions:

1.) You have hired as an IT security consultant to fix the security problem of ACM united global manufacturing. The company has been hacked mercilessly over the last six months, with three of the attacks making headlines for the negative impact they have had on the firm and of the customers. You have been given 90 days and a budget of $1 million. Where would you begin, and what steps would you take to fix the problems?

2.) Your friend just told you that he is developing a worm to attack the administrator systems at your college. The worm is harmless and will simple cause a message-“Lets party”-to be displayed in all the workstations on Friday afternoon at 3:00 pm and by 4:00 pm the virus will erase itself and destroy evidence of its presence. What would you say or DO?

3.) It appears that someone is using your firms corporate directory- which includes job titles and email addresses- to contact senior managers and directories via e-mail. The message request that they click the URL that takes them to a web site that looks as if it were designed by your HR organizations. Once at this phony web site, they are asked to confirm the bank and account number to be used for electronic deposit of their annual bonus check. You are a member of IT security firm. What can you do?

PRELIM QUIZ NO1: Malware

Group Reporting

What to know?

1.) What is Malware?

2.) Types of Malware

3.) Real life Malware Attacks

Description:

At My Site, I believe that knowledge is power. We strive to provide our readers with the most current and accurate information about cyber threats and malware. Our goal is to keep the public informed and educated on the ever-evolving digital landscape.

One of the ways we do this is by creating a group activity about malware. This activity is designed to help people better understand the different types of malware and how to protect themselves against them. Through this activity, we hope to empower our readers to make informed decisions and stay ahead of any potential threats.

Prelim Quiz No3: 5 Pillars of Information Security

Individual

Questions:

1.) 5 Pillars of Information Security

2.) Your own understanding and definition

3. two examples for each type of Pillars of IAS

Description:

The 5 Pillars of Information Assurance and Security provide a framework to help ensure the safety and integrity of information systems. The 5 pillars are: confidentiality, integrity, availability, authentication, and non-repudiation. Confidentiality ensures that sensitive information is protected from unauthorized access. Integrity ensures that data is not modified or corrupted without authorization. Availability ensures that systems and services are available to authorized users when needed. Authentication ensures that users are who they claim to be. Non-repudiation ensures that the originator of a message cannot deny having sent it. Together, these 5 pillars form the foundation of an effective information security program.

bottom of page