Week 2 Tutorial Sheet
Introduction to Cyber Security
IMPORTANT NOTES: Study lecture materials at least 1 hour and prepare Question 1-4 prior to the tutorial session. Those questions will be discussed in the tutorial.
1. Distinguish or define the following terms within the context of security: Vulnerability, Threat and Control.
Copyright By PowCoder代写 加微信 powcoder
2. Categorise the type of security threats (or attacks) to computers/distributed systems/computer networks by the type of security goal that is breached.
3. Give an example to each of the above category – can be your own personal computer, corporate computer systems such as Monash University, etc. Relate those threats to hardware/software/data as applied to corporate computer systems.
4. What are the differences between passive attack and active attack?
5. Describe different types of passive attacks and active attacks.
6. For each of the following example systems, state the security goal you think is most important and rank in order of imporance any other relevant goals, giving your reasoning: (1) online banking, (2) bureau of meterology weather forecast website, (3) military intelligence database.
程序代写 CS代考 加微信: powcoder QQ: 1823890830 Email: powcoder@163.com