EE4215_t2-sol - Use a taxonomy to show the relationship of a operators programmers internal staff external staff and outsider against b information

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
EE4215 Tutorial 2 <suggested answers> 1. What is the simplified approach for a System Security Engineer to tackle a computer security problem? <Chapter 2 slides 9-15> 2. What is threat tree? What are the steps for developing a threat tree? How critical, effort and risk are defined? How risk factor is used for assessing the risk of being attack? <chapter 2 slide 16 & slides 20-28 OR FAQ Part 21> 3. What is attack taxonomy? Give examples of some risk based empirical attack.
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Use a taxonomy to show the relationship of a) operators, programmers, internal staff, external staff and outsider against b) information theft, masquerading, abuse and pest programs. <chapter 2 slides 30-36 OR 2009 Test solution> 4. What is the difference between Trojan Horses and Virus? What is self reproducing program and how to write a virus program? <chapter 2 slides 47,48,51 and 53-55 >...
View Full Document

This note was uploaded on 01/11/2012 for the course EE EE4215 taught by Professor Drcheng during the Winter '11 term at City University of Hong Kong.

Ask a homework question - tutors are online