Introduction After reading the case presented in the Module Introduction and the
Place your order now for a similar assignment and have exceptional work written by our team of experts, At affordable rates
After reading the case presented in the Module Introduction and the “Closing Scenario” at the bottom of section 1-5c Security as a Social Science of Module 1 : Introduction to Information Security, write a short response to the following discussion questions.
Do you think this event was caused by an insider or outsider? Explain your answer.
Other than installing virus and worm control software, what can SLS do to prepare for the next incident?
Do you think this attack was the result of a virus or a worm? Explain your answer.
Ethical Decision Making
Often an attacker crafts e-mail attacks containing malware designed to take advantage of the curiosity or even greed of the recipients. Imagine that the message body Amy saw on the e-mail from Davey had been “See our managers’ salaries and SSNs” instead of “Funniest joke you’ll see today.”
Would it be ethical for Amy to open such a file?
If such an e-mail came in, what would be the best action to take?
Writing and Submission Requirements
Create an MS Word file to write down your responses, save it as Activity1.4_[your last name].docx and submit.
Approximately 60 words for each question.
For standard requirements, review the Discussion and Written Assignment Expectations.