Business Information System | Describe ‘social engineering’ from an I.S. security perspective, Define ‘alien software, difference between ‘unintentional’ and ‘deliberate’ threats to information systems, Define ‘asymmetric encryption’ from an I.S. perspective

$21.00

Assignment – Part A

DO NOT FORGET TO USE INTEXT CITATIONS IN EVERY QUESTION (do not remove this instruction)

  • Question 1:Describe ‘social engineering’ from an I.S. security perspective. Provide two examples of social engineering and two safeguards to prevent these examples. (~250 Words)Question 2: Define ‘alien software’. Explain how it differs from viruses, worms and trojan horses. Give 4 examples of alien software and explain how they work. (~250 Words)
  • Question 3: Define the difference between ‘unintentional’ and ‘deliberate’ threats to information systems. Provide 4 examples of deliberate threats and explain how they work.(~250 Words)
  • Question 4: Define ‘asymmetric encryption’ from an I.S. perspective. Discuss the relationship between encryption, certificate authorities and digital certificates.(~250 Words)

Description

Your Name:  Insert your name here

Student Number:  Insert your Deakin College student ID number here

(we will not mark this if the Deakin University ID is used-the Deakin University I.D. begins with the number ‘2’ your Deakin College ID has letters and numbers and is above the Deakin University ID on your student card)