Assignment I
(100 points)
Using your text as a resource, respond to Cases 1, 2, 3, 4
Each case is worth 25 points.
Please respond to the questions appearing at the end of each case and confine your responses to 250-300 words for each case (approximately the length of a one-page, double-spaced document or two computer screens).
Remember to document your sources (Internet sites, text material, outside readings, etc.)
Assignment II
(100 points)
Using your text as a resource, respond to cases 5, 6, and 7, 8.
Each case is worth 25 points.
Follow guidelines for Assignment I for length and documentation requirements.
Assignment III
(100 points)
Respond to each (4) of the following statements (each is worth 25 points).
- The cost of cryptographic equipment and techniques has dropped significantly over the past five years; however, cryptology is often not implemented because of its complexity and lack of trained personnel to install and administer its use.
Design a basic (200-300 words, 2 computer screens) justification for implementing a cryptographic technique. Include in your response the pros and cons.
- The loss of data/information from a network intrusion, while very serious, may not be as critical as the loss of reputation resulting from the act. One of the worst possible public relations problems a company can have, especially in the service community which often deals with sensitive information, is a public perception that information stored on the company's network is not well guarded. This fear of loss of reputation is so powerful, it often keeps businesses from reporting computer crimes for fear that their vulnerabilities may scare away business.
Draft a brief response addressing the issues of loss of reputation, policy, public perception, regulations regarding disclosure of breaches (200-300 words, 2 computer screens maximum).
- ATMs have become the increasing target of crime. Rather than robbing a bank, criminals now find the "convenience" of ATMs extends to their motives as an ATM is much more cooperative than a human teller in a holdup situation because the entire machine, including its cash reserves, can be hauled away without a scream or a fight. Banks are now sending written warnings to customers about safe ATM practices and also alarming ATMs so that any attempt to tamper or remove the machine sends off an immediate alarm.
What are some of the guidelines banks are circulating to customers relating to ATM usage (200-300 words, 2 computer screens maximum).
- Many managers feel that computer crimes are easily detected and easily prosecuted. Prevention on the front end is always preferable to detection or punishment on the back end. Estimates of the chances of a computer crime being detected are about 1 in 100 and the chance of being prosecuted for the crime about 1 in 22,000.
Address the issues related to prevention/prosecution in terms of cost, time/effort, employee policy, etc. (200-300 words, 2 computer screens maximum).
Note: Please document all sources in your response.
(Source: Resource Guide to Accompany Computer Security Management, Boyd and Fraser Publishing Company, 1994, Karen A. Forcht)
Assignment IV
(100 points)
- Look up Internet Report - Lattanze Center at:
David D. Lattanze Center for Executive Studies in Information Systems, Loyola College in Maryland.
- http://lattanze.loyola.edu/ Go to section (papers) containing Dr. Forcht's research project, titled, "Privacy, Confidentiality, Security and Control Issues Relating to the Wide-spread Use of the Information Highway (WP 0996.031)
(http://lattanze.loyola.edu:80/lattanze/research/ or http://lattanze.loyola.edu:80/lattanze/research/wp0996.031.html)Prepare a policy statement (5-6 pages, 10 computer screens) detailing an Internet Security Policy). (100 points)
- Complete your Individual Report (see Portfolio and Individual Project) (300 points)
Document your sources (use the original source as stated in Dr. Forcht's report)