Case Project 1-2 Attack Experiences
Based on your own personal experiences or those of someone you know (you may have to interview other students or a friend), write a paragraph regarding a computer attack that occurred. When did it happen? What was the attack? What type of damage did it inflict? Using the information in Table 1-2, list the reason or reasons you think that the attack was successful. How was the computer fixed after the attack? What could have prevented it? Write a one- page paper about these experiences.
Case Project 2-1: Researching Trojan Attacks
Trojans continue to be a highly favored means of attack today and pose a seri- ous threat to users. Use the Internet to search for the latest information regarding current Trojans. You may want to visit security vendor sites, like Symantec or McAfee, or security research sites such as sans.org to find the lat- est information. What are the latest attacks? What type of damage can they do? What platforms are the most vulnerable? Write a one-page paper on your research.
Case Project 3-4: Zero-Day Attacks
Attacks that exploit previously unknown vulnerabilities are considered some of the most dangerous attacks. Use the Internet to research these attacks. How are the vulnerabilities discovered? What are some of the most recent zero-day attacks? What defenses are there against them? Write a one-page paper on your research.
Case Project 4-1: Antivirus Comparison
Select four antivirus products, one of which is a free product, and compare their features. Create a table that lists the features. How do they compare with the AV software you currently use? Which would you recommend to others? Why? Create a report on your research.
Case Project 5-1: Hash Algorithm
Comparison Research the different hash algorithms (Message Digest, Secure Hash Algo- rithm, Whirlpool, and RIPEMD) and then create a table that compares them. Include the size of the digest, the number of rounds needed to create the hash, block size, who created it, what previous hash it was derived from, its strengths, and its weaknesses.
Case Project 6-2: Key Management Life Cycle
Draw a diagram that illustrates what a key management life cycle would look like. How long should a key be valid? What steps should be taken when a key is about to expire? Who should be responsible for keys, the user or the organization? Anno- tate your diagram with steps that should be taken at each step along the cycle.
Case Project 7-4: Network Firewall Comparison
Use the Internet to identify three network firewalls, and create a chart that compares their features. Note if they are rule-based or application-aware, perform stateless or stateful packet filtering, what additional features they include (IDS, content filtering, etc.), their costs, etc. Which would you recommend? Why?
Case Project 8-5: Cloud Computing Benefits
Would your school or place of work benefit from cloud computing? Identify at least two cloud computing vendors and research their features and costs. Then look at one element of your school or work’s network infrastructure and apply it to cloud computing. Would it be feasible? Why or why not? Write a one-page paper on your research and opinions.