This is a takehome exam which means that you can take it home or work on it here at school, but please do the work individually. You can ask me for help in order to clarify what I am asking or for suggestions on places to look for references.
If the question asks you to provide a reference, please provide one. Actually look up a reference for the answer.
Answer all the questions to the best of your ability. That means, don't skip a question. This test is not supposed to be time limited which means you can take your time and look up information you don't know. Never leave an answer blank ... bad strategy on a test. Even if you guess, you will likely get some points for the answer. And, if you are really, really confused as to what I am asking, just email me and I will answer ... in a reasonable time.
For a computer that you use, describe how you implement that principle to safeguard your computer. If you currently do nothing for that principle, state how you could implement it.
For example, Limiting, the number of people who can access your computer, plus a secure login and password.
a. Describe how ECC works briefly.
b. What are several advantages of ECC over other Asymmetric methods.
c. Research a commercial implementation of ECC and describe it.
Is there an open source product that has the same functionality. Hint: See Chapter 5 of the text.
Cover the stages: 1. Reconnaissance, 2. Scanning, and 3. Gaining Access.
Research this malware
a. Describe how they work,
b. Dangers they pose to systems or people they infect,
c. Defenses against this class of malware
Link to the article is here: Fred Cohen Article
1. Assume you are a security administrator, in charge of protecting your company. Would any of the typical defense mechanisms that you know of protect your organization from this caliber of attack. Here I am assuming, Virus scanners, firewalls, personal authentication (passwords etc.), cryptography and anything else that falls under the category of the usual security mechanisms.
2. Do you believe this is true .. .or at least possible. Why or why not? Have you read or seen anything similar to this type of attack outside of movies.
3. What other types of defenses can you envision that will help guard against this type of attack. Be creative. Your solution should incorporate certain policies with regards to data and its security.
Type your answers to the above questions and turn them in during class in hard copy format.