Discussion #1

  • REQUIRED BOOK FOR THE DISCUSSION:
    Author of book: Randall J. Boyle and Raymond R. Panko
    Chapter Title: The Threat Environment
    Author of Chapter: Randall J. Boyle and Raymond R. Panko

    Year: 2015

  • Title of book: Corporate Computer Security (4th Edition)
  • A good answer would cite the text book or an external source:
  • Chapter 1 The Threat Environment: Attackers and their Attacks
  • Short essay of one or two paragraphs should be adequate.
  • The best answer will cite both the text and external sources.
  • Answers are not graded on the length or volume but on the student’s ability to defend their stated position within the answer.
  • Please number your answers so they correspond to the questions listed below.
  • After each answer (or clearly state within the answer) the source(s) used. Although form and style is not considered in grading of this assignment, it may be a good opportunity to practice APA form and style rules for citing sources.
  1. Briefly explain using your own words (do not copy) the following threats:
    • Spyware
    • Trojan Horse
    • Root Kit
    • Worm
    • Virus.
  2. Chapter one presented employee, ex-employee, and external threats. Of these three types of threats, which are the most dangerous? Briefly describe the types of resources that could be used to mitigate threats from each of these groups.
  3. Give an example of the application of the Defense in Depth concept as this term would apply to Information Systems Security.
  4. What types of threats would an untrained employee pose to Information Systems Security?

Submit your answers in Word or RTF format.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now