Reference no: EM132443625
World's Famous Security Breaches: What are the lessons learned from them?
Directions: You can refer to HISTORY. You may revisit newspapers, e-magazines, journals, youtube, and other sources where you can get information about the world's security breaches. Definitely, you must have known them, too.
Follow the format down below:
Direction(s):
Security Breach (The Topic):
Brief Description about the Security Breach
Perpetrators or Violators of the Security Breach
Name/Position/Company
Affected People or Entities because of the Security Breach
Name/Position/Company
Setting of the Security Breach
Date(s) or Duration:
Place/Venue:
Extent of Loss or Liabilities
The World's Insights
Problem/Issue:
People(s) or Entities Involved:
Solution(s):
My Personal Insights
Problem/Issue:
Proposed Solution(s):
Relevance to this Course:
Other security breaches similar or related to the topic:
ASSIGNMENT :
Direction: Answer the following substantially.
Questions:
1. Give examples of the following: Confidentiality, Integrity, and Availability. What are the crimes committed if each one of this has been violated? Explain.
2. Who is John McCumber? Provide his autobiography including his photo.
3. Explain Risk Assessment?
4. Aside from McCumber Cube and the Model Extension with Risk Assessment, what are other available models for Risk Assessment?
5. Explain the ISO and IEC Security Models and Frameworks.
6. Discuss the History of PDCA Approach.
7. Assuming that you are a COBIT Agent, make a slide presentation which you will use to market COBIT to your audience. Make sure to provide the essential information about COBIT.
8. Explain IT Audits including Information Security Audits.
9. What are Security Requirements? Explain each.
10. "There can be a tradeoff between Security and Availability." Expound the statement.
11. What is Risk Management?
12. Compare and contrast: Risk Assessment and Risk Analysis.
13. Discuss the different levels of security required to complete a solution.
14. Compare and contrast: Qualitative Risk Assessment and Quantitative Risk Assessment
15. Differentiate the following tools for risk analysis:
• SAFE Suite from Internet Security Systems
• Kane Security Analyzer
• Cerberus Internet Scanner
16. Discuss the following risk assessment methodologies:
• NIST 800-30 - Risk Management Guide for Information Technology Systems
• OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation)
• FRAP (Facilitated Risk Analysis Process)
• Spanning Tree Analysis
17. "Risk can be mitigated through policies and technologies." Expound.
18. Discuss Risk Treatment with EXAMPLES.
19. What is Residual Risk?
20. Learn and Share: What is the RISK MANAGEMENT mechanism (e.g. policy, procedures, policies, tools, models, or system) that your current institution has adopted?
Question 1: Give examples of the following: Confidentiality, Integrity, and Availability. What are the crimes committed if each one of this has been violated? Explain.
Attachment:- Security Breaches.rar