Assignment 1 - An Overview of Computer Security
Discussion Questions
- (DUE August 30, 2005 by midnight EDT) Briefly discuss what you learned from the readings in chapters 1-3:
- What was the most surprising thing you learned?
- What was the most difficult part for you?
- (DUE August 30, 2005 by midnight EDT) Select one of the following questions to discuss in detail through the threaded discussion.
- The aphorism "security through obscurity" suggests that hiding information provides some level of security." Give an example of a situation in which hiding information does not add appreciably to the security of a system. Then give an example of a situation in which it does.
- Consider a very high-assurance system developed for the military. The system has a set of specifications, and both the design and implementation have been proven to satisfy the specifications. What questions should school administrators ask when deciding whether to purchase such a system for their school's use?
- How do laws protecting privacy impact the ability of system administrators to monitor user activity?
- A graduate student accidently releases a program that spreads from computer system to computer system. It deletes no files but requires much time to implement the necessary defenses. The graduate student is convicted. Despite demands that he/she be sent to prison for the maximum time possible (to make an example of him), the judge sentences him to pay a fine and perform community service. What factors do you believe caused the judge to hand down the sentence he did? What would you have done were you the judge, and what extra information would you have needed to make your decision?
- (DUE September 4, 2005 by midnight EDT) Select a discussion from one or more of your classmates and respond to their comments.
Click here to return to Wayne's World's homepage:
written by Wayne Summers summers_wayne@ColumbusState.edu