Task:
This page contains the Learning Resources for this week. Be sure to scroll down the page to see all of this week’s assigned Learning Resources.
In Unit 1, you will use a variety of resources. This page outlines the resources that you will need to participate in the Discussion and to complete the Assignment.
Required Resources
Oriyano, S.-P. (2014). Hacker techniques, tools, and incident handling. (2nd ed.) Burlington, MA: Jones & Bartlett Learning.
oChapter 1, “Hacking the Next Generation”
This chapter discusses a number of topics that include: the history of hacking, why systems are vulnerable, hackers, ethical hacking, and hacking-related laws.
oChapter 10, “Malware”
This chapter discusses malware, worms, viruses, spyware, adware, and scareware.
Baldwin, M. (2008). The evolution of malware and the underground economy. InfosecStuff. Retrieved
This article briefly speculates on the direction that hackers may take when evolving their malware.
Riley, M., & Walcott, J. (2011). China-based hacking of 760 companies shows cyber Cold War. Bloomberg. Retrieved from
This article discusses China-based hacking and cyberspying.
Williamson, W. (2011). Five must-have capabilities for controlling modern malware. SecurityWeek. Retrieved
This article discusses the modern malware threat and how IT organizations need to adapt to combat it.
Document: Unit 1 Notes
You will use this document to complete this unit’s Assignment.
Reports
The reports listed below are essential resources for understanding current security issues and trends. As such, most are lengthy documents; therefore, you are not required to read each document in its entirety. However, you will need to determine which portions of each are needed to support your answers to Discussion and Assignment questions. Each site links to the most recent report.
The post ITNET202A Enterprise Security appeared first on My Assignment Online.