SlideShare a Scribd company logo
1 of 2
Read the Case Study at the end of Chapter 7. Perform the
following and present the results in a 1- to 2-page report:
Hackers broke into a computer at the University of California at
Berkley recently and gained access to 1.4 million names, Social
Security numbers, addresses, and dates of birth that were being
used as part of research project. The FBI, the California
Highway Patrol, and California Department of Social Services
were investigating the incident which happened in August 2004.
Security personnel were performing a routine test of intrusion
detection when they noticed that an unauthorized user was
attempting to gain access to the computer. A database with a
known security flaw was exploited, and a patch was available
that would have prevented the attack. The negligence in
attending to the known security flaw appears to be a common
mistake among institutes of higher learning in the state. Banks,
government agencies, and schools are known to be the top
targets for hackers. Hackers may attack financial institutions in
an effort to profit from the crime, and government agencies to
gain notoriety. Private companies generally have made at least
some effort to ensure that data is secure, but hackers attack
institutes of higher learning often because there are frequent
lapses in security. This presents a problem not only for the
university, but also is a danger to other entities, since denial-of-
service attacks may be generated from the compromised
university computers. One of the problems at universities may
be the lack of accountability or overreaching department that
has authority to oversee all systems, and limit modifications. In
the name of learning, many lesser qualified individuals,
sometimes students, are given authority make modifications to
operating systems and applications. This presents a continuing
problem for administrators and represents a threat to all who
access the Internet.
UC Berkeley Case Study
Financial and government organizations store a good deal of
personal information, such as Social Security numbers, birth
dates, and addresses. As a result, they have been attractive
targets for hackers. Because most of these institutions have
improved their access controls, hackers may choose instead to
attack organizations with similarly valuable data but lower
security.
Read the Case Study at the end of Chapter 7. Perform the
following and present the results in a 1- to 2-page report:
·
Define a set of policies and procedures that would allow
educational institutions to limit vulnerabilities while still
allowing students access to academic systems.
·
Determine who should be ultimately accountable for ensuring
that a security policy is in place and is enforced.
·
Identify the person at your school who is responsible for
maintaining the security policy and prepare your
recommendations as a memo to him or her
.

More Related Content

Similar to Read the Case Study at the end of Chapter 7. Perform the following a.docx

Data Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALData Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINAL
Joseph White MPA CPM
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
Russell Publishing
 
Data security
Data securityData security
Data security
oco26
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
msdee3362
 
Seminar Paper Heller
Seminar Paper HellerSeminar Paper Heller
Seminar Paper Heller
Kyle Heller
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10
Deepa Devadas
 
IMT 552-JPMorgan Chase & Co. Risk Assessment v05
IMT 552-JPMorgan Chase & Co. Risk Assessment v05IMT 552-JPMorgan Chase & Co. Risk Assessment v05
IMT 552-JPMorgan Chase & Co. Risk Assessment v05
Daniel Kapellmann Zafra
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
 
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docxCHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
christinemaritza
 

Similar to Read the Case Study at the end of Chapter 7. Perform the following a.docx (20)

Data Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALData Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINAL
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
 
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALINCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Data security
Data securityData security
Data security
 
Key findings from information security survey at higher education institution...
Key findings from information security survey at higher education institution...Key findings from information security survey at higher education institution...
Key findings from information security survey at higher education institution...
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
An Exploratory Study of the Security Management Practices of Hispanic Students
An Exploratory Study of the Security Management Practices of Hispanic StudentsAn Exploratory Study of the Security Management Practices of Hispanic Students
An Exploratory Study of the Security Management Practices of Hispanic Students
 
Seminar Paper Heller
Seminar Paper HellerSeminar Paper Heller
Seminar Paper Heller
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10
 
IMT 552-JPMorgan Chase & Co. Risk Assessment v05
IMT 552-JPMorgan Chase & Co. Risk Assessment v05IMT 552-JPMorgan Chase & Co. Risk Assessment v05
IMT 552-JPMorgan Chase & Co. Risk Assessment v05
 
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docxCHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
 
Cyber liability and the growing threat to emergency services
Cyber liability and the growing threat to emergency servicesCyber liability and the growing threat to emergency services
Cyber liability and the growing threat to emergency services
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information Security
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 

More from niraj57

Need help creating a very simple mobile game using Flash builder and.docx
Need help creating a very simple mobile game using Flash builder and.docxNeed help creating a very simple mobile game using Flash builder and.docx
Need help creating a very simple mobile game using Flash builder and.docx
niraj57
 
need help completing week 6 ilab.. i will upload what I currently ha.docx
need help completing week 6 ilab.. i will upload what I currently ha.docxneed help completing week 6 ilab.. i will upload what I currently ha.docx
need help completing week 6 ilab.. i will upload what I currently ha.docx
niraj57
 
Need discussion board type answers to the following questions. No wo.docx
Need discussion board type answers to the following questions. No wo.docxNeed discussion board type answers to the following questions. No wo.docx
Need discussion board type answers to the following questions. No wo.docx
niraj57
 
Need at least a 200 min word response with a cited sourceI do .docx
Need at least a 200 min word response with a cited sourceI do .docxNeed at least a 200 min word response with a cited sourceI do .docx
Need at least a 200 min word response with a cited sourceI do .docx
niraj57
 
Need as soon as possible1)Which of the following represent .docx
Need as soon as possible1)Which of the following represent .docxNeed as soon as possible1)Which of the following represent .docx
Need as soon as possible1)Which of the following represent .docx
niraj57
 
Need Argumentative essay of minimum of 2000 words over sources below.docx
Need Argumentative essay of minimum of 2000 words over sources below.docxNeed Argumentative essay of minimum of 2000 words over sources below.docx
Need Argumentative essay of minimum of 2000 words over sources below.docx
niraj57
 
Need Argumentative essay of minimum over sources below.  Essay needs.docx
Need Argumentative essay of minimum over sources below.  Essay needs.docxNeed Argumentative essay of minimum over sources below.  Essay needs.docx
Need Argumentative essay of minimum over sources below.  Essay needs.docx
niraj57
 
Need a job description for the Miami Police Department. It was one o.docx
Need a job description for the Miami Police Department. It was one o.docxNeed a job description for the Miami Police Department. It was one o.docx
Need a job description for the Miami Police Department. It was one o.docx
niraj57
 
Need all of this answeredPart IDefine the following term.docx
Need all of this answeredPart IDefine the following term.docxNeed all of this answeredPart IDefine the following term.docx
Need all of this answeredPart IDefine the following term.docx
niraj57
 

More from niraj57 (20)

Need help in doing two assignment, first one the topic will be Soci.docx
Need help in doing two assignment, first one the topic will be Soci.docxNeed help in doing two assignment, first one the topic will be Soci.docx
Need help in doing two assignment, first one the topic will be Soci.docx
 
Need for Cultural Competence Use this Discussion to practice as a .docx
Need for Cultural Competence Use this Discussion to practice as a .docxNeed for Cultural Competence Use this Discussion to practice as a .docx
Need for Cultural Competence Use this Discussion to practice as a .docx
 
need help in finance report,I already have report with all the b.docx
need help in finance report,I already have report with all the b.docxneed help in finance report,I already have report with all the b.docx
need help in finance report,I already have report with all the b.docx
 
Need help creating a very simple mobile game using Flash builder and.docx
Need help creating a very simple mobile game using Flash builder and.docxNeed help creating a very simple mobile game using Flash builder and.docx
Need help creating a very simple mobile game using Flash builder and.docx
 
Need help finsishing a potery explication esssay that i started,.docx
Need help finsishing a potery explication esssay that i started,.docxNeed help finsishing a potery explication esssay that i started,.docx
Need help finsishing a potery explication esssay that i started,.docx
 
need help completing week 6 ilab.. i will upload what I currently ha.docx
need help completing week 6 ilab.. i will upload what I currently ha.docxneed help completing week 6 ilab.. i will upload what I currently ha.docx
need help completing week 6 ilab.. i will upload what I currently ha.docx
 
Need discussion board type answers to the following questions. No wo.docx
Need discussion board type answers to the following questions. No wo.docxNeed discussion board type answers to the following questions. No wo.docx
Need discussion board type answers to the following questions. No wo.docx
 
Need at least a 200 min word response with a cited sourceI do .docx
Need at least a 200 min word response with a cited sourceI do .docxNeed at least a 200 min word response with a cited sourceI do .docx
Need at least a 200 min word response with a cited sourceI do .docx
 
Need by tomorrow 3pm estUse the Internet to research the various m.docx
Need by tomorrow 3pm estUse the Internet to research the various m.docxNeed by tomorrow 3pm estUse the Internet to research the various m.docx
Need by tomorrow 3pm estUse the Internet to research the various m.docx
 
Need assignment ASAP well written no plagiarism and own work= 1050 t.docx
Need assignment ASAP well written no plagiarism and own work= 1050 t.docxNeed assignment ASAP well written no plagiarism and own work= 1050 t.docx
Need assignment ASAP well written no plagiarism and own work= 1050 t.docx
 
Need as soon as possible1)Which of the following represent .docx
Need as soon as possible1)Which of the following represent .docxNeed as soon as possible1)Which of the following represent .docx
Need as soon as possible1)Which of the following represent .docx
 
Need Argumentative essay of minimum of 2000 words over sources below.docx
Need Argumentative essay of minimum of 2000 words over sources below.docxNeed Argumentative essay of minimum of 2000 words over sources below.docx
Need Argumentative essay of minimum of 2000 words over sources below.docx
 
Need Argumentative essay of minimum over sources below.  Essay needs.docx
Need Argumentative essay of minimum over sources below.  Essay needs.docxNeed Argumentative essay of minimum over sources below.  Essay needs.docx
Need Argumentative essay of minimum over sources below.  Essay needs.docx
 
Need a job description for the Miami Police Department. It was one o.docx
Need a job description for the Miami Police Department. It was one o.docxNeed a job description for the Miami Police Department. It was one o.docx
Need a job description for the Miami Police Department. It was one o.docx
 
Need answers ASAP!!1.Explain how the project manager measure.docx
Need answers ASAP!!1.Explain how the project manager measure.docxNeed answers ASAP!!1.Explain how the project manager measure.docx
Need answers ASAP!!1.Explain how the project manager measure.docx
 
Need a cost management plan that includes the followingCost Estim.docx
Need a cost management plan that includes the followingCost Estim.docxNeed a cost management plan that includes the followingCost Estim.docx
Need a cost management plan that includes the followingCost Estim.docx
 
Need all of this answeredPart IDefine the following term.docx
Need all of this answeredPart IDefine the following term.docxNeed all of this answeredPart IDefine the following term.docx
Need all of this answeredPart IDefine the following term.docx
 
Need an Essay in Humanites about .docx
Need an Essay in Humanites about .docxNeed an Essay in Humanites about .docx
Need an Essay in Humanites about .docx
 
need a paper written, no particular ampunt of words as long as the.docx
need a paper written, no particular ampunt of words as long as the.docxneed a paper written, no particular ampunt of words as long as the.docx
need a paper written, no particular ampunt of words as long as the.docx
 
Need 3 people to do assignment; Independent Challenge 1, Independent.docx
Need 3 people to do assignment; Independent Challenge 1, Independent.docxNeed 3 people to do assignment; Independent Challenge 1, Independent.docx
Need 3 people to do assignment; Independent Challenge 1, Independent.docx
 

Recently uploaded

Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
cupulin
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 

Recently uploaded (20)

PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 

Read the Case Study at the end of Chapter 7. Perform the following a.docx

  • 1. Read the Case Study at the end of Chapter 7. Perform the following and present the results in a 1- to 2-page report: Hackers broke into a computer at the University of California at Berkley recently and gained access to 1.4 million names, Social Security numbers, addresses, and dates of birth that were being used as part of research project. The FBI, the California Highway Patrol, and California Department of Social Services were investigating the incident which happened in August 2004. Security personnel were performing a routine test of intrusion detection when they noticed that an unauthorized user was attempting to gain access to the computer. A database with a known security flaw was exploited, and a patch was available that would have prevented the attack. The negligence in attending to the known security flaw appears to be a common mistake among institutes of higher learning in the state. Banks, government agencies, and schools are known to be the top targets for hackers. Hackers may attack financial institutions in an effort to profit from the crime, and government agencies to gain notoriety. Private companies generally have made at least some effort to ensure that data is secure, but hackers attack institutes of higher learning often because there are frequent lapses in security. This presents a problem not only for the university, but also is a danger to other entities, since denial-of- service attacks may be generated from the compromised university computers. One of the problems at universities may be the lack of accountability or overreaching department that has authority to oversee all systems, and limit modifications. In the name of learning, many lesser qualified individuals, sometimes students, are given authority make modifications to operating systems and applications. This presents a continuing problem for administrators and represents a threat to all who access the Internet. UC Berkeley Case Study
  • 2. Financial and government organizations store a good deal of personal information, such as Social Security numbers, birth dates, and addresses. As a result, they have been attractive targets for hackers. Because most of these institutions have improved their access controls, hackers may choose instead to attack organizations with similarly valuable data but lower security. Read the Case Study at the end of Chapter 7. Perform the following and present the results in a 1- to 2-page report: · Define a set of policies and procedures that would allow educational institutions to limit vulnerabilities while still allowing students access to academic systems. · Determine who should be ultimately accountable for ensuring that a security policy is in place and is enforced. · Identify the person at your school who is responsible for maintaining the security policy and prepare your recommendations as a memo to him or her .