Uploaded by Joud Ghazzi

CSE -Spring 20-21-Assign1 (1)

advertisement
CSE210 – Spring 20-21 – Assignment#1
Objective and Overview
Marks: out of 10%
▪ Identify, describe and evaluate the levels of protection and response to security threats
Grading Rules - rubric
Group Submission
▪ Evaluation Criteria:
o Correctness and clarity:
▪ The answer is correct and has no factual mistakes.
▪ The answer is explained with clear language and is supported by
illustrating examples whenever necessary.
o Completeness:
5% Part (A)
▪ The answer covers all required elements/criteria.
o Critical analysis
5% Part (B)
▪ Justifications and reasoning are logical and supported by logical
arguments.
▪ The student makes reflections from his/her own opinion whenever
necessary.
o Format
▪ Report is properly formatted using consistent font size/style, consistent
alignment, page numbers, captions, and headers.
▪ Proper citation and referencing is applied wherever appropriate.
Submission Rules
▪ Submit in word format on blackboard.
▪ Due on 20th March 2021 – late submissions will be penalized. Reports will be scanned for similarity and high similarity
score will be penalized.
•
Work with your team members and analyze the Case Studies/Articles on BB then complete Part (A) and Part (B)
tasks.
Part (A)
Background / Scenario
Security breaches occur when individuals or applications are trying to gain unauthorized access to data,
applications, services, or devices. During these breaches, the attackers, whether they are insiders or not, attempt
to obtain information that they could use for financial gains or other advantages. In this task, you will explore a
few security breaches to determine (1) what was taken, (2) what exploits were used, and (3) what you can do to
protect yourself.
o
o
Read the following 2 articles available on your BB:
▪ Missing drives contained PHI on 950K Centene customers.
▪ Article 29 Working Party still not happy with Windows 10 privacy controls
Conduct some search to look for similar incidents/attacks and record the findings in the below table:
Incident
Date
Affected
Organization
How many victims?
What was Taken?
What exploits were used?
How do you
protect
yourself?
Reference Source
Part (B)
Background / Scenario
Social media and online storage have become an integral part of many people’s lives. Files, photos, and videos
are shared between friends and family. Online collaboration and meetings are conducted in the workplace with
people who are many miles from each other. The storage of data is no longer limited to just the devices you
access locally. The geographical location of storage devices is no longer a limiting factor for storing or backing
up data at remote locations. In this task, you will explore legal agreement required to use a social media platform.
You will also explore some of the ways you can protect your data and then will analyze a data breach for a wellknown university.
o
o
Read the following article available on your BB:
▪ HACKED: A CASE STUDY
Explore the Terms of Service Policy of Facebook
▪ Facebook: https://www.facebook.com/policies
The Terms of Service, also known as Terms of Use or Terms and Conditions, is a legally binding contract that governs the rules of
the relationship between you, your provider, and others who use the service. After reading Facebook Terms of Service agreement
answer the following questions:
1.
What is the data use policy on Facebook?
2.
What are the possible privacy settings? List and explain each.
3.
What is the security policy?
4.
What are your rights regarding your data? Can you request a copy of your data?
5.
What can the provider do with the data you upload?
6.
What happens to your data when you close your account?
7.
Reflect of the University of Michigan’s Hacking incident.
a. How did the problem start?
b. How did they respond? Explain the actions taken to resolve the problem in sequence and the impact of each on
the audience of University of Michigan’s Facebook accounts.
c. What were the main challenges in resolving the problem?
d. What was the cause of the problem?
e. Did Facebook Inc. support The University of Michigan? If yes, explain how.
f. According to Facebook’s Policy and Terms of use, what would have happened if Facebook Inc. took a passive role?
Download