Salman bin Abdul-Aziz University College Of Business Administration DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS MIS 430 – Information Security Assignment 1 Student Name Student Number Due Date 02-03-2013 Signature General Instructions The assignment should clearly mention the student name and student number. Please read all the questions carefully. Answer all the questions. Late submissions will be penalized 10 points per day. 1 DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS Salman bin Abdul-Aziz University College Of Business Administration DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS Each Question Carries 2 Points 1. A(n) is a threat characterized by a great amount of planning, a longer period of time to conduct the activity, more financial backing to accomplish it, and the possible corruption of, or collusion with, insiders. 2. Infrastructure whose loss would have a severe detrimental impact on the nations is called 3. . is a warfare conducted against the information and information processing equipment used by an adversary. 4. A simply sends a “ping” to the target machine. 5. A(n) is a threat that is generally short-term in nature, does not involve a large group of individuals, does not have a large financial backing, and does not generally include collusion with insiders. 6. are the most technically competent individuals conducting intrusive activities on the internet. They can not only exploit known vulnerabilities but are usually the ones responsible for finding those vulnerabilities. 7. A helps identify which ports are open, thus giving an indication of which services may be running on the targeted machines. 8. are individuals who do not have the technical expertise to develop scripts or discover new vulnerabilities in the software but who have just enough understanding of computer systems to be able to download and run scripts that others have developed. 9. A(n) is a threat characterized by a much longer period of preparations, tremendous financial backing, a large and organized group of attackers, and a large and organized group of attackers. It may include efforts to subvert insiders as well as plant individuals inside a potential target in advance of an attack. 10. In a type of attacks an attempt to find and attack site that has the hardware or the software that is vulnerable to a specific exploit. 11. is the act of deliberately accessing computer systems and network without authorization. 12. are the most common problems/ threat an organization faces. 2 DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS Salman bin Abdul-Aziz University College Of Business Administration DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS 13. is a term used to describe a process in which each side of an electronic communication verifies the authenticity of the other. 14. The security principle used in the Bell-Lapadula security model that states that no subject can read from an object with a higher security classification is called 15. . is the security rule used in the Bell-Lapadula security model that states that a subject could write to an object only if its security classification was less than or equal to the security level of an object. 16. An that the data with a higher integrity is believed to be more accurate or reliable than data of a lower integrity level. 17. policy prevents subjects from writing to object of a higher integrity level. 18. The principle in which a subject has only the necessary rights and privileges to perform its task, with no additional permissions, is called 19. . is the principle in security whose goal it is to ensure that data is only modified by individuals who are authorized to change it. 20. is the process used to ensure that an individual is who they claim to be. 21. is a method to establish authenticity of specific objects such as an individual’s public key or downloaded software. 22. is the most common form of authentication used. 23. The CIA of security includes , and . 24. CHAP stands for . 25. uses more than one method to verify authenticity. 26. is the basis for authentication used in Kerberos. 27. is described as the ability of a subject to interact with an object. 28. means that all the Information Systems and Information is available when needed. 3 DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS Salman bin Abdul-Aziz University College Of Business Administration DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS 29. means to ensure that only those individuals who have the authority to view a piece of information may do so. 30. is to ensure that the data, the system is available for the use when an authorized user wants it. 31. means the ability to verify that a message has been sent and received and that the sender can identified and verified. 32. allows any subject to read any object without regards to the integrity levels and without lowering the integrity levels. Each Question carries 18 Points Question 1: Please write short notes on the following i. Hacking, v. Script kiddies, ii. Unstructured attacks, vi. Sophisticated intruders and iii. Structured attacks, vii. Elite hackers. iv. Highly structured attacks, Question 2: Please write short notes on the following i. Host security iv. Discretionary Access Control ii. Network security v. Mandatory Access Control iii. Access controls vi. Role Based Access Control 4 DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS