Test I, CSCI 277, Fall 2022


  1. Vulnerability, Threat, Control
    1. [6 points] Define each.
    2. [6 points] Consider the computer hardware in a public lab.
      1. Describe an associated vulnerability.
      2. Describe a threat associated with this vulnerability.
      3. Describe a control to counter this threat.
    3. [3 points] Are all threats due to a human actor? Why or why not?

  2. C-I-A security triad.
    1. [6 points] Name and describe the three components of this triad.
    2. [6 points] Consider the computer hardware in a public lab. Discuss how that hardware could be vulnerable to each component of the CIA triad.

  3. [4 points] Name and describe one of the common types of attackers. Describe the risks and a risk level associated with this type of attacker.

  4. [4 points] What is an advanced persistent threat?

  5. The chapter described three distinct classes of controls.
    1. [6 points] Name and describe each
    2. [3 points] Give an example of each.

  6. Rootly Powers
    1. [6 points] Name and or describe the three powers associated with root on a linux system.