Case Exercise Chapter 2
1. Gladys and Charlie are on the same page. They both believe that in order to fix the
problem this time they need a real solution. Fred, however, feels differently. Fred wants a
2. UDP packets are by design connectionless
Tcp packets usually involve the creation of a connection from one host computer to another.
It would be unusual for a single transaction to involve both tcp and upd por
2. before a project plan be developed, however, management should articulate and coordinate the
organizations information security visions and objectives with the communities of interest involved in
2. A security administrator can go find information on an established security framework by looking at
the security blueprint that is either adopted or adapted to by organizations. The name of the model is
Even # pg 147-148
2. Civil law represents a wide variety of laws that govern a nation or state and deal with the relationships
and conflicts between organizational entities and people
4. The National Information Infrastructure Pro
1. i think the offender was an outsider because it was stated in narrative that the problems started when
the users clicked their e-mail attachments. And most e-mails normally come from the outside.
2. They sho
It seems obvious that Miller is breaking at least a few laws in his attempt at revenge. Suppose that when
his scanning efforts had been detected, SLS not only added his IPaddress to the list of sites banned fr
2. IT function as a peer of other functions such as network, applications development and the help desk.
physical security function- as a peer of physical security or protective services.
Even number questions pg. 40
2. Vulnerability is a fault within the system, such as software package flaws, unlocked doors or an
unprotected system port. It leaves things open to an attack or damage.
Exposure is a single instance
2. cryptography the process of deriving codes and using the codes to secure the information between
sender and the receiver
4. key is also termed as crypto variable. The information used in conjunction with an al