forked from klausuren/klausuren-allgemein
25 lines
1.6 KiB
TeX
25 lines
1.6 KiB
TeX
\input{../settings/settings}
|
|
|
|
\usepackage{graphicx}
|
|
\usepackage{amsmath}
|
|
\usepackage{amssymb}
|
|
\usepackage{amsfonts}
|
|
\begin{document}
|
|
\klausur{IT English}{Susan Madiedo}{Wintersemester 14/15}{60}{Wörterbuch}
|
|
\section{Task}
|
|
|
|
Choose \textbf{\underline{one}} of the questions below and write a text of approximately 200 words. Write the number of the question on your answer sheet.
|
|
|
|
|
|
\begin{enumerate}
|
|
|
|
\item Using the format of either a comparison or a process analysis text, describe the role of encryption in IT security. Be sure to include security concepts covered in the CISSP book and in class. Give specific examples using information found in the homework, in student presentations and their hand-outs, as well as ideas from class discussions.\\\
|
|
\item Using the format of a process analysis text, describe a process related to IT security. (e.g. risk analysis, access controls, an attack, a counter-measure, administrative controls) that you are familiar with. Be sure to include security concepts covered in the CISSP book and in class. Give specific examples using information found in the homework, in student presentations and their hand-outs, as well as ideas from class discussions.
|
|
\\\
|
|
\item Using the format of a comparison text, company or institution (e.g. Sony, Target, Banks, Estonian government, etc.) handled a specific attack to how it ideally should have managed their security system. Be sure to include security concepts covered in the CISSP book and in class. Give specific examples using information found in the homework, in student presentations and their hand-outs, as well as ideas from class discussions.
|
|
|
|
|
|
\end{enumerate} %ende Aufgabe 1
|
|
|
|
|
|
\end{document} |