Question details

Assessment item 2
$ 45.00

Assignment 1
Value: 20%
Due date: 25-Aug-2014
Return date: 15-Sep-2014
Length: 600-800 words
Submission method options
Alternative submission method
Write around 600 to 800 words for each of the short-essay questions. All questions are of equal value.
You should provide credible references for each question according to the Faculty of Business
Topic 1- Introduction to Information Security
Question 1 Consider the TJX data breach case discussed in Chapter 1 of the textbook.
(a) Using the library and/or textbook to address who would be likely the victims in the TJX
breach. (2.5 marks)
(b) Discuss which of the CIA goals that TJX has failed to achieve in this attack. (2.5 marks)
Topic 2 – Cryptography
Question 2
(a) Explain why cryptography is not an automatic protection. (2 marks)
(b) Identify potential security threats associated with authentication via digital signatures and digital
certificates. Explain each and describe how you would address each threat. (3 marks)
Topic 3 - Network Security fundamentals – 1
Question 3
(a) Explain ARP poisoning and provide suitable methods to prevent ARP attacks. (2.5 marks)
(b) The 802.1X standard today is being applied primarily to wireless LANs rather than to wired LANs.
Why do you think that is? (2.5 marks)
Topic 3 - Network Security fundamentals – 1
Question 4
(a) With 802.11 security issues in WLAN recently, discuss why turning off Service Set Identifier
(SSID) and applying MAC access control list in an Access Point would not completely address
security vulnerability for wireless network. (2.5 marks)
(b) Given the weakness of commercial WAN security, why do you think companies continue to use
WAN technology without added cryptographic protections? (2.5 marks)
Topic 4 - Network Security fundamentals – 2
Question 5
(a) Before you run a password cracking program on your company’s computers to check for weak
passwords, what should you do? (2 marks)
(b) Your friend wants to secure his or her desktop PC with fingerprint scanning or password access
protection. Give your friend the information that he or she should know to make the decision.
Consider alternatives. (3 marks)
Online submission via Turnitin is required for this assignment.

Available solutions