Professional Documents
Culture Documents
1. (TCO A) List and assess at least three kinds of damage a company could suffer when
the integrity of a program or company data are compromised. (A description of damage, not a
definition of data integrity, is required.) (Points : 40)
2. (TCO B) Suppose you have a high capacity network connection coming into your home, and you
also have a wireless network access point. Also, suppose you do not use the full capacity of your
network connection. List and assess four reasons why you might still want to prevent an outsider
obtaining free network access by intruding into your wireless network. (Points : 40)
3.
used? Assess whether this would be good for today's security programs. If not, what would be
good to use and why? (Points : 40)
4. (TCO D) You have been asked to give a presentation to a law school class on digital crime. After
the presentation, a student asks why so few people are actually prosecuted for computer crime
when these crimes seem to be happening all the time. Give a five-point outline of your response
to this question. Assess the impact on preventing crimes from your perspective given these
issues. (Points : 40)
The four authentication policies are Encryption, Firewalls, HostBased Authentication, and Constrained User Interfaces. The four
authentication policies that cannot be controlled by technology are
fingerprint, iris, voice pattern, and face. These four are strictly
based off the physical person.
6. (TCO F) In the U.S., laws are enforced by police agencies and the courts. What are ethics and
who enforces them? (Points : 40)
1.
8.(TCO H) Some IT department policies are designed to prevent behaviors by IT staff. While some
depend upon the employee voluntarily complying with the policy (for example: do not reveal technical
information to outside parties), others are enforced technically (for example, authentication required
for system access). What is an example of a policy that technically enforces ethical behavior by IT
staff? Provide policy wording for your example. (Points : 40)
Employees are expected to use the internet and/or e-mail for official
purposes only. Any employee that doesn't adhere to these policies set,
appropriate action will be taken to include possible termination."