EE4215_t2 - Use a taxonomy to show the relationship of a...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
EE4215 Tutorial 2 1. What is the simplified approach for a System Security Engineer to tackle a computer security problem? 2. What is threat tree? What are the steps for developing a threat tree? How critical, effort and risk are defined? How risk factor is used for assessing the risk of being attack? 3. What is attack taxonomy? Give examples of some risk based empirical attack.
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Use a taxonomy to show the relationship of a) operators, programmers, internal staff, external staff and outsider against b) information theft, masquerading, abuse and pest programs. 4. What is the difference between Trojan Horses and Virus? What is self reproducing program and how to write a virus program?...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online