Exercise 1-1
Using a Web browser, search for any information security policies used at
your academic institution. Compare them to the ones discussed in this chapter.
Are there sections missing? If so, which ones?
Exercise 1-2
Using a Web browser, go to www.gocsi.com and download the latest CSI Computer Crime
and Security Survey. What threats are currently the most dangerous? Which threats represent
problems for your home computer? For your lab computer?
Exercise 1-3
Using a Web browser, go to http://cve.mitre.org. What type of site is this, and what information
can it provide? Change the URL to http://cve.mitre.org/cve, click Search, and enter IP Validation
Vulnerability in the search field. Click Search again. What information are you provided with?
How would this be useful? Go to the URL noted in the CVE description for the Microsoft refer-
ence. What additional information are you provided? How would this be useful?
Exercise 2-1
Using a Web browser and a search engine, search the terms “BP deepwater
disaster plan failure.” You will find many results. Select one article and iden-
tify what that article considers a shortcoming in BP’s planning. What part of
the contingency planning process came up short (IR, BP, or CP)? How could the shortcoming
have been prevented?
Exercise 2-2
Using a Web browser and a search engine, search the terms “CitiBank backup tapes lost.”
You will find many results. Select one article and identify what that article considers a short-
coming in CitiBank’s planning. What part of the contingency planning process came up short
(IR, BP, or CP)? How could the shortcoming have been prevented?
Complete the real world exercises at the end of the chapter. Write your answers in complete sentences and use APA formatting rules. Each answer should be a minimum of 1 paragraph (3 or more sentences)