ForumsDiscussion board forums for Mission Plan 1.

This document contains a list of discussion board forums for the mission plan listed in the title above. Each discussion board forum listed in this document has a matching entry in your Blackboard Discussion Board folder as a forum. Since all that is contained in the Blackboard Discussion Board forum entry is a link to this document, you must follow the instructions detailed here for each discussion board forum assignment.

When you are ready to contribute to the Discussion Board forum, be sure that you make your entry within a new Thread and for the correct forum. To get information on how to use the Blackboard Discussion board, click on the following link: http://screencast.com/t/PQU6znZhIpp

 

All discussion board assignments are required and are worth 3 points. For information pertaining to the grading detail, please view the rubrics for each discussion board entry within Blackboard.

To access a discussion board topic, click on the appropriate topic link below:

Topic 1-1: Discuss today's attacks

Topic 1-2: Discuss the importance of information security in our modern world.

Topic 1-3: Discuss who the attackers are.

Topic 1-4: Discuss the different varieties of attacks.

Topic 1-5: Discuss the various avenues of defense against common attacks.


Topic 1-1: Discuss today's attacks.

Virtually everyone that is connected to information technology has at one time or another been affected by cyber criminals; 4 out of every 5 Internet users, 14 adults per second.  Realistically, there are many more types of “attacks” than there are devices and these attacks are often very complex.

The table below identifies a few of the most recent attacks.  This discussion assignment will require that you research and then report on 2 of these attacks.  

Required presentation topics:

  1. Research the attack on the Internet.
  2. Identify a few key items such as when it happened, the scope of the attack, the location of the attact, the estimated cost of the attack, and the severity of the damages.
  3. Provide a web address of your research.
  4. Provide information on an specific attack that has yet to be reported on - you can use the same attack category that someone else has used, but not the same attack.

Todays Attacks


Topic 1-2: Discuss the importance of information security in our modern world.

It is important to everyone...

  1. To prevent data theft
  2. To protect your identity.
  3. To avoid the legal consequences of not securing information.
  4. To maintain productivity.
  5. To foil cyber terrorism.

Businesses and individuals are at risk of losing (in total) billions of dollars due to losses created because of breaches to data and personal information, illegal use of information, and loss of productivity!


This discussion assignment will require that you define one of five topics listed above using the following criteria:

  1. Research the topic on the Internet.
  2. Identify a few key items such as why this topic is important and how it relates to modern day uses of information techology.
  3. Provide a web address of your research.
  4. Avoid defining a topic that was already defined, but if this is not possible add to a thread information to further define another student's definition.

Topic 1-3: Discuss who the attackers are.

This discussion will explore the various types of people known to be information security attackers.

Computer attackers can be divided into several categories such as:

  1. Cybercriminals
  2. Script Kiddies
  3. Spies
  4. Insiders
  5. Cyberterrorists
  6. Hactivists
  7. Goverment Agencies

For additional information pertaining to the categories of attackers click on the link below.
http://coursecontent.ntc.edu/CIT/husband/pois/lp1/m31-attackers.html

You are responsible for defining two attackers using the following criteria:

  1. Research the topic on the Internet.
  2. Identify a few key characteristics pertaining to this type of attacker.
  3. Provide a web address of your research.
  4. Avoid defining a topic that was already defined, but if this is not possible add to a thread information to further characterize a type of an attacker that is already defined.

Topic 1-4: Discuss the different varieties of attacks.

This topic will explore 5 basic steps that attackers may take to penetrate a computer.

There are 5 basic steps that most attackers take to penetrate a computer and these are:

  1. Probe for information
  2. Penetrate any defenses
  3. Modify security settings
  4. Circulate to other systems
  5. Paralyze networks and devices

Click on the link below to get more detailed information on each of these topics.

http://coursecontent.ntc.edu/CIT/husband/pois/lp1/m41-attacks.html

You are responsible for defining one of the above attacks using the following criteria:

  1. Research the topic on the Internet.
  2. Identify a few points pertaining to your attack.
  3. Provide a unique entry and/or add to an existing thread.

Topic 1-5: Discuss the various avenues of defense against common attacks.

Building a secure defense requires that multiple defense mechanisms be used.  This discussion will explore these defenses.

Building a secure defense requires that multiple defense mechanisms be used.  There are five fundamental defense methods commonly used in business and are listed below. 

  1. Layering
  2. Limiting
  3. Simplicity
  4. Obscurity
  5. Diversity

Click on the link below to get more detailed information on each of these methods.

http://coursecontent.ntc.edu/CIT/husband/pois/lp1/m51-defense.html

This discussion will require that you define two of the defenses listed above using information that you find on the Internet, my link above, and/or your own experiences. Please do not duplicate an entry that has already been made - you may contribute by adding to an existing thread.