From 46ba6335643250338ba8ae919166dddae53148b9 Mon Sep 17 00:00:00 2001 From: Hendrik Cech Date: Sun, 7 Jun 2015 11:13:19 +0200 Subject: [PATCH] IT English 1 WS 14/15 - abgeschrieben von Franz Schaefer --- it_english_1/it_english_1_ws1415.tex | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 it_english_1/it_english_1_ws1415.tex diff --git a/it_english_1/it_english_1_ws1415.tex b/it_english_1/it_english_1_ws1415.tex new file mode 100644 index 0000000..1cda771 --- /dev/null +++ b/it_english_1/it_english_1_ws1415.tex @@ -0,0 +1,25 @@ +\input{../settings/settings} + +\usepackage{graphicx} +\usepackage{amsmath} +\usepackage{amssymb} +\usepackage{amsfonts} +\begin{document} +\klausur{IT English}{Susan Madiedo}{Wintersemester 14/15}{60}{Wörterbuch} +\section{Task} + +Choose \textbf{\underline{one}} of the questions below and write a text of approximately 200 words. Write the number of the question on your answer sheet. + + +\begin{enumerate} + +\item Using the format of either a comparison or a process analysis text, describe the role of encryption in IT security. Be sure to include security concepts covered in the CISSP book and in class. Give specific examples using information found in the homework, in student presentations and their hand-outs, as well as ideas from class discussions.\\\ +\item Using the format of a process analysis text, describe a process related to IT security. (e.g. risk analysis, access controls, an attack, a counter-measure, administrative controls) that you are familiar with. Be sure to include security concepts covered in the CISSP book and in class. Give specific examples using information found in the homework, in student presentations and their hand-outs, as well as ideas from class discussions. +\\\ +\item Using the format of a comparison text, company or institution (e.g. Sony, Target, Banks, Estonian government, etc.) handled a specific attack to how it ideally should have managed their security system. Be sure to include security concepts covered in the CISSP book and in class. Give specific examples using information found in the homework, in student presentations and their hand-outs, as well as ideas from class discussions. + + +\end{enumerate} %ende Aufgabe 1 + + +\end{document} \ No newline at end of file