Activity 2

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

IAS102

Activity #2
1. Consider the statement: an individual threat agent, like a hacker, can be a factor in
more than one threat category. If a hacker hacks into a network, copies a few files,
defaces the Web page, and steals credit card numbers, how many different threat
categories does this attack fall into?

2. Using the Web, research Mafiaboy’s exploits. When and how did he compromise
sites? How was he caught?

3. Search the Web for the “The Official Phreaker’s Manual.” What information contained
in this manual might help a security administrator to protect a communications system?

4. The chapter discussed many threats and vulnerabilities to information security. Using
the Web, find at least two other sources of information on threat and vulnerabilities.
Begin with www.securityfocus.com and use a keyword search on “threats.”

You might also like