Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Introduction to Information Assurance Engineering - Homework 6 | CPE 449, Assignments of Engineering

Material Type: Assignment; Class: INTRO INFORM ASSURANCE ENGR; Subject: Computer Engineering; University: University of Alabama - Huntsville; Term: Unknown 1989;

Typology: Assignments

Pre 2010

Uploaded on 07/23/2009

koofers-user-na5
koofers-user-na5 🇺🇸

10 documents

1 / 4

Toggle sidebar

Related documents


Partial preview of the text

Download Introduction to Information Assurance Engineering - Homework 6 | CPE 449 and more Assignments Engineering in PDF only on Docsity!

Risk Assessment

This homework assignment should be based primarily on the reading assignments of: Assessing_Risk.pdf If you have any suspicion that your answer is weak or insufficient, it probably is, conduct some Internet research before submitting your final answers.

  1. Before starting a Risk Assessment, what 5 questions should you ask yourself:





  2. Explain “requirements driven” relating to making security expenditures.



CPE 449/549 INFORMATION ASSURANCE ENGINEERING I

Homework 6

  1. According to the reading, why perform a “technical assessment”?





  2. According to the reading, why do companies still perform “Internet Security Assessments”?





  3. Describe the use of Ping to support our Risk Assessment?





  1. According to the reading, what are 5 different ways to compromise a system?




  2. What are the three general types of vulnerability scanners, why do we need three types?





  3. According to this article, what are the three most pervasive services on the Internet?


  1. Explain how web application vulnerability testing is different from standard OS or network vulnerability testing.




  2. List the eight most common web application vulnerability categories:







  3. If you wanted to make a mirror copy of a website and save it to your local hard drive, which tool described in the reading would be best suited to do this for you?
  4. Describe the WebSleuth tool?