Professional Documents
Culture Documents
Module 2 - Task 1 Exercise Worksheet
Module 2 - Task 1 Exercise Worksheet
A computer worm has infected your company’s network and is about to run riot.
You’ve determined that there is already one infected machine, and that every
infected machine will be able to infect two new machines every two hours. How
many total machines (including the already infected machine) will be infected in
12 hours’ time if you can’t stop the spread?
Sally and Tim are in a relationship and live together with a shared a desktop
computer. Sally has recently noticed Tim using IM a lot more than normal on the
machine and asks Tim who he is speaking to all the time. Tim responds that it’s
just for work.
Sally installs free spyware on their desktop to log Tim’s keystrokes and monitor
his activity.
Two weeks’ later, Sally is buying groceries and her card is declined, although
she knew she had money in it this morning.
What could have occurred based on the information above, and what steps
should Sally take going forward?
The following list discusses some common scenarios we are seeing in the
current climate and the risks associated with them.
Exercise Instructions
For this exercise, review the following scenarios brought about by the COVID-19
pandemic, identify the type of attack at risk of being carried out and then write
a short sentence on how to prevent a threat actor gaining access to a system.