E-Commerce

E-Commerce


You are not connected. Please login or register

Case Study 4

View previous topic View next topic Go down  Message [Page 1 of 1]

1 Case Study 4 on Fri Feb 05, 2010 4:25 pm

Admin


Admin
Case 4 (20 Marks)
Phishing and Pharming

You have just graduated, and are employed by “Business Communications
Consulting” as an IT security expert. Your boss, the Director of Technical Systems,
has been asked to provide the board of directors with a report about “phishing” and
“pharming” and the threats these pose to the company and its employees using
company resources, so that the board can determine whether there are any
implications for its strategic plan. Your boss is too busy to do it himself and
delegates the task to you. He gives you the following guidance:
Find information about “phishing” and “pharming”, including:
· What the terms mean and the difference between them;
· the threats these issues pose to the company and its employees;
· any secondary threats that these may be used to introduce;
· the possible vulnerabilities to each of these threats;
· the mechanisms that may be involved in exploiting these vulnerabilities;
· what mechanisms are available counter the threats; and
· how much these security mechanisms could impact on legitimate users.
Make sure you use at least five different sources of information, and around
1500 - 2000 words should be enough for the level of detail I’m after.
Notes:
At least one of the sources you use must have been through a “peerreviewed”
process, meaning that it is published in a scholarly journal or presented
at an international (or international-quality) conference. When counting words, you
should not include the executive summary (or abstract), references or lengthy
quotations.
You are free to choose between the IEEE and Harvard referencing style.
It is important that you consistently use one of these styles. As a reminder, there
are marks allocated for references.
You should structure your report logically. You should use headings where
they will help the reader. It is not necessary to structure your report strictly
according to the details your boss asked for, although you may judge that to be
appropriate.
The word count suggestion is not a “hard limit”. You can go over or under a
little if necessary. However, be aware that communication skills are very important.
If you were, for example, to submit a 5000 word assignment, you may be
demonstrating an inability to follow instructions or an inability to communicate
clearly and succinctly.
This is an individual assignment, not one to be done by groups. Locating
information is an important skill that is assessed in this course. While it would be
acceptable to give another student help, the actual task of finding, selecting, and
judging individual information sources must be done by each student.
You are required to read information from a number of sources, understand a
topic, and then formulate your own words to answer the particular questions asked
above. Where you can find no better way to express an individual idea than the
words used by one of your sources, you should enclose those words in quotation
marks, and refer to their source. Anything less is plagiarism.
Submission Instructions
Submission deadline is Friday 3pm, February 12, 2010. Penalty for late
submission is 10% of your mark per day your submission is late. All submission
items need to be submitted before this date and time.
The following items need to be submitted:
· A printed version of your assignment to be submitted to me or to the Ms.
Josephine Magada(IC office). Your assignment submission must be accompanied by
a signed coversheet declaring.
· You also need to submit an electronic version of your assignment in PDF
(preferred) through the class forum.
Marking Scheme
Description of “phishing” and “pharming” and the threats these pose
to the company and its employees, including any secondary threats
that these may be used to introduce (Demonstrate correct
interpretation and application of security vocabulary, and adequate
comprehension of literature.)
4 marks
Description of the vulnerabilities that may be exploited to realise
those threats and the mechanisms that may be involved in exploiting
these vulnerabilities. (Demonstrate correct interpretation and
application of security vocabulary, and adequate comprehension of
literature.)
3 marks
Description of the mechanisms available to counter the threats and
how much these security mechanisms could impact on legitimate
users. (Demonstrate correct interpretation and application of security
vocabulary, and adequate comprehension of literature. Adequate
explanation of why the threat will no longer succeed, or be less likely
to succeed. Identification of potential impact on legitimate use.)
5 marks
Information sources. Locate and use at least one peer-reviewed
resource. You should use at least three independent quality sources
on “phishing” and use at least two on any secondary threats you
identify. (It might not be possible to find peer-reviewed papers on
“pharming” yet.) Wikipedia is not an academic quality resource. You
must cite it if you use it, but it will not be one of your five quality
resources.
3 marks
Citation and Referencing. (Citations and reference list contains
necessary information, chosen formatting is used consistently.)
3 marks
Report Presentation and Structure (logical flow, formatting, grammar,
typos, etc.)
2 marks

View user profile http://ecommerce.forumsmotion.com

2 Case Study #4 on Thu Feb 18, 2010 4:26 pm

Case Study #4

View user profile

3 Re: Case Study 4 on Thu Feb 18, 2010 8:25 pm

Use Case No. 4 Very Happy

View user profile

4 Re: Case Study 4 on Thu Feb 18, 2010 9:00 pm

CASE STUDY 4

View user profile http://ymrebmomville.tk

5 Re: Case Study 4 on Thu Feb 18, 2010 9:01 pm

CASE STUDY 4



Last edited by Ronic.Concepcion on Thu Feb 18, 2010 9:56 pm; edited 1 time in total

View user profile http://www.dodare.co.cc

6 Case Study 4 on Thu Feb 18, 2010 9:23 pm

Case Study 4

View user profile

7 Re: Case Study 4 on Thu Feb 18, 2010 10:14 pm

Case Study 4

View user profile

8 case study 4 on Thu Feb 18, 2010 10:47 pm

case study 4

View user profile

9 Re: Case Study 4 on Thu Feb 18, 2010 10:47 pm

View user profile

10 My case study 4 on Thu Feb 18, 2010 10:54 pm

lol!
Case Study 4

View user profile

11 Re: Case Study 4 on Thu Feb 18, 2010 11:33 pm

case study 4

View user profile http://gelaneam.blogspot.com/

12 Re: Case Study 4 on Thu Feb 18, 2010 11:59 pm

Case Study 4

Embarassed Embarassed Embarassed
Very Happy Very Happy Very Happy

View user profile

13 Case Study 4 on Fri Feb 19, 2010 12:03 am

Case Study 4



Last edited by Melgar John Gascal on Fri Feb 19, 2010 12:16 am; edited 1 time in total

View user profile

14 case4 on Fri Feb 19, 2010 12:07 am

case4



Last edited by cherryannmontejo on Fri Feb 19, 2010 12:16 am; edited 1 time in total

View user profile http://authenticallyblack.blogspot.com

15 caseStudy4 on Fri Feb 19, 2010 12:11 am

caseStudy4 Shocked

View user profile

16 Case Study 4 on Fri Feb 19, 2010 12:18 am

case study 4

View user profile

17 Re: Case Study 4 on Fri Feb 19, 2010 12:26 am

Case Study 4
Very Happy Very Happy Very Happy Very Happy

View user profile

18 case 4 on Fri Feb 19, 2010 1:23 am

Case #4
View or Download

View user profile
Case_Study_4_hernandez

http://www.4shared.com/file/225197223/192ece77/Case_Study_4_hernandez.html

SORRY forgot to post it before passing the paper

View user profile http://woophie.blogspot.com

20 case study 4 on Fri Feb 19, 2010 6:50 pm

View user profile

21 CASE STUDY 4 on Fri Feb 19, 2010 11:46 pm

CASE STUDY 4

View user profile

22 case 4 on Mon Feb 22, 2010 9:28 pm

Case Study 4

View user profile

23 Re: Case Study 4 on Sun Mar 21, 2010 9:56 pm

[url=http://jpaniambaan.orgfree.com/Case Study 4.pdf]http://jpaniambaan.orgfree.com/Case Study 4.pdf[/url]

View user profile

24 Re: Case Study 4 Today at 6:33 pm

Sponsored content


View previous topic View next topic Back to top  Message [Page 1 of 1]

Permissions in this forum:
You cannot reply to topics in this forum