Description
Question One
- From an information assurance perspective,
- Explain what threats mean.
- What are the major categories of the threat? Explain each and provide an example
Note:
Don’t use any example from the book or the slide, and use your own words to explain your answer.
Question Two
In one paragraph, explain why creating a culture of good information security practice is essential within an organization.
Question Three
Cyber attackers often exploit vulnerabilities to launch malware attacks such as viruses, worms, and trojans. Explain how such threats take advantage of system weaknesses and spread through different infection routes. Then, write a real-life scenario (from business, education, or healthcare) that shows how one of these threats could compromise a system, and suggest countermeasures to reduce the risk.
Question Four
Critically analyze why zero-day exploits are more dangerous than traditional malware attacks. Support your answer with two key reasons and suggest strategies organizations can adopt to reduce their exposure.
Assignment 1
Deadline: Day 01/10/2025 @ 23:59
[Total Mark for this Assignment is 8]
Student Details:
Name: ###
ID: ###
CRN: ###
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Restricted – مقيد
Question One
Pg. 01
Learning
Outcome(s):
Question One
2 Marks
CL2 Analyze
security threats,
vulnerabilities,
and risks
1. From an information assurance perspective,
• Explain what threats mean.
• What are the major categories of the threat? Explain
each and provide an example
Note:
Don’t use any example from the book or the slide, and use
your own words to explain your answer.
Restricted – مقيد
Question Two
Pg. 02
Learning
Outcome(s):
CLO3: Apply
proper security
countermeasures.
Restricted – مقيد
Question Two
2 Marks
In one paragraph, explain why creating a culture of good information
security practice is essential within an organization.
Question Three
Pg. 03
Learning
Outcome(s):
Question Three
2 Marks
CLO6:
Demonstrate the
process of
investigating
computer crimes
Restricted – مقيد
Cyber attackers often exploit vulnerabilities to launch malware attacks
such as viruses, worms, and trojans. Explain how such threats take
advantage of system weaknesses and spread through different infection
routes. Then, write a real-life scenario (from business, education, or
healthcare) that shows how one of these threats could compromise a
system, and suggest countermeasures to reduce the risk.
Question Four
Pg. 04
Learning
Outcome(s):
Question Four
2 Marks
Critically analyze why zero-day exploits are more dangerous than
CL2 Analyze
traditional malware attacks. Support your answer with two key reasons
security threats,
and suggest strategies organizations can adopt to reduce their exposure.
vulnerabilities,
and risks
Restricted – مقيد
Purchase answer to see full
attachment