All sources must be cited. That means you should have a citation in every answer … But if the source is the textbook, class discussion, or your own work experience, feel free to cite them that way, e.g. “(textbook)”, “(class discussion)”, or “(work experience)”. No need to go find a specific article or page number from the text.

-Pick five (5) of the following items to address. Please include the original question with your answer, so it’s clear which one you’re answering ☺. Answers to each of my numbered items below should be 2 to 3 paragraphs, with exceptions noted in the question as appropriate.

1.Based on our discussion of various types of malicious attacks (Chapter 11), which two or three of them do you consider to be the most significant threat against government and political organizations, and why? Which threats may not be as great of a risk for those organizations, and why?

2.Organizations can choose to keep all of their data encrypted both in transit (when it’s being moved on a network) as well as in storage. Obviously, there are upsides to this – it’s less vulnerable to theft, among others. Comment on the tradeoffs of always-encrypted storage, considering things like scalability, reliability, cost, and the CIA triangle.

3.In light of the numerous high-profile attacks on retailers and banks, what “big picture” lessons should Chief Information Security Officers and CEOs take from these events? Given that it’s much less expensive to learn from someone else’s misfortune (or error), what advice would you as a consultant give to the CISO and to the CEO in dealing with this new world? There should be at least four concrete learnings identified in your answer.

4.One of the emerging risks in the security field is highly targeted attacks – often with a very specific piece of malware, or an attack targeted to a specific individual in a firm. Think about this from the perspective of the attacker

– what are the tradeoffs to conducting a targeted attack on a small number of individuals, vs. a larger-scale attack on an entire company or some large group of consumers? Be sure to consider both the “costs” to the attacker, as well as their potential gains. Here, a pro/con or cost/benefit table might be a useful structure for part of your answer.

5.Physical security refers to the need to protect the physical assets of an organization. In some organizations, one senior officer is responsible for both physical and logical (workstation, network, system/application, and other domains) of security. In other organizations, physical and logical security are divided between at least two senior officers. (Feel free to review, if you like, for one take on the topic.) What do you see as the pros and cons of having an integrated organizational structure, responsible for both physical and logical security? (A paragraph plus bullets for pros and cons would be appropriate here.)

6.Part of a disaster recovery plan may make some assumptions about the state of services provided to the organization by third parties. In the event of a disaster as wide-spread as a major hurricane or typhoon, what are some of the steps that an organization should take to ensure its long-term viability? How does short-term recovery planning differ from long-term viability planning?

7.What are some of the ways that technology-based tools can support an organization’s operations in the face of a disaster? For example, in banking, customers might be able to use Internet banking to conduct their business, even if the bank branch is closed. What other technologies can an organization put in place or leverage to support its operations? Pick an industry to focus on and think about what technologies and services might work best for that industry. What critical points of failure might still be present that limit the effectiveness of these tools?

8.Cloud-based operations could assist organizations in their overall security planning. Discuss some of the pros and cons of cloud-based operations of some or all of a company’s technology. For example, CLU outsources its e-mailfunction for students to Google – you might look at how that helps and/or impedes CLU’s security planning. This question is specific to the planning aspects of security, not to actual threats and risks.

9.Given the recent DDoS attack on DYN Corporation, which provides DNS services to a number of large corporations, what are at least three potential motivations of an attacker to try a DDoS attack against DYN? What types of things could the attacker hope to gain or learn from the process of the attack?

Leave a Reply

Your email address will not be published. Required fields are marked *