What additional information are you provided? How would this be useful?

Report Issue
Exercise 1-1

Using a Web browser, search for any information security policies used at

your academic institution. Compare them to the ones discussed in this chapter.

Are there sections missing? If so, which ones?

Exercise 1-2

Using a Web browser, go to www.gocsi.com and download the latest CSI Computer Crime

Report Issue
Exercise 1-1

Using a Web browser, search for any information security policies used at

your academic institution. Compare them to the ones discussed in this chapter.

Are there sections missing? If so, which ones?

Exercise 1-2

Using a Web browser, go to www.gocsi.com and download the latest CSI Computer Crime

and Security Survey. What threats are currently the most dangerous? Which threats represent

problems for your home computer? For your lab computer?

Exercise 1-3

Using a Web browser, go to http://cve.mitre.org. What type of site is this, and what information

can it provide? Change the URL to http://cve.mitre.org/cve, click Search, and enter IP Validation

Vulnerability in the search field. Click Search again. What information are you provided with?

How would this be useful? Go to the URL noted in the CVE description for the Microsoft refer-

ence. What additional information are you provided? How would this be useful?

Exercise 2-1

Using a Web browser and a search engine, search the terms “BP deepwater

disaster plan failure.” You will find many results. Select one article and iden-

tify what that article considers a shortcoming in BP’s planning. What part of

the contingency planning process came up short (IR, BP, or CP)? How could the shortcoming

have been prevented?

Exercise 2-2

Using a Web browser and a search engine, search the terms “CitiBank backup tapes lost.”

You will find many results. Select one article and identify what that article considers a short-

coming in CitiBank’s planning. What part of the contingency planning process came up short

(IR, BP, or CP)? How could the shortcoming have been prevented?

Complete the real world exercises at the end of the chapter. Write your answers in complete sentences and use APA formatting rules. Each answer should be a minimum of 1 paragraph (3 or more sentences)
and Security Survey. What threats are currently the most dangerous? Which threats represent

problems for your home computer? For your lab computer?

Exercise 1-3

Using a Web browser, go to http://cve.mitre.org. What type of site is this, and what information

can it provide? Change the URL to http://cve.mitre.org/cve, click Search, and enter IP Validation

Vulnerability in the search field. Click Search again. What information are you provided with?

How would this be useful? Go to the URL noted in the CVE description for the Microsoft refer-

ence. What additional information are you provided? How would this be useful?

Exercise 2-1

Using a Web browser and a search engine, search the terms “BP deepwater

disaster plan failure.” You will find many results. Select one article and iden-

tify what that article considers a shortcoming in BP’s planning. What part of

the contingency planning process came up short (IR, BP, or CP)? How could the shortcoming

have been prevented?

Exercise 2-2

Using a Web browser and a search engine, search the terms “CitiBank backup tapes lost.”

You will find many results. Select one article and identify what that article considers a short-

coming in CitiBank’s planning. What part of the contingency planning process came up short

(IR, BP, or CP)? How could the shortcoming have been prevented?

Complete the real world exercises at the end of the chapter. Write your answers in complete sentences and use APA formatting rules. Each answer should be a minimum of 1 paragraph (3 or more sentences)

"Order a similar paper and get 15% discount on your first order with us
Use the following coupon
"FIRST15"

Order Now