Zimbabwe Provisional License Revision
Zimbabwe Provisional License Revision
Tvs bkeved that the problem of computer security has changed over a pid of time a
business, though
Inctesed use of information technology (TT), have bese more and more dependent on
information and the
sociated formation yer (IS). However at the same tn, thee has oon lite hangs inthe
implemented
Scouty ox safeguard to these information syste, nfl many execs or manages flo even
def the
relevant requirement fr security or polices,
‘A. The lnteret has bees roghly doubling in size evry you, ud the astcited security
incidents have been
B. In 1988 the Moris "wor was introduced on th Internet to invade, stack nd replete
isi on he network:
“The rexpome watt shut down E-mail and connectivity. However te ice’ wee to be
datibted va Ema
and $0 the solution was self-defeating. As result of his worm Vins, CERT (Computer
Emergency Response
“ean was formed wth Ausalan version (AUSCERT) starting in 1992
©. Oncof the probloms wit nem scary isthe fet tha th incidents ae increasing in
sophistication. One of
the reson for his has ben the increasing ailaility of oli, Although these toolkits
are designed o assist
‘computer syst designer to protec and Jeelop their ste, thy lo allow relatively
ignorant nade cary
‘uticreasnpy comple ncisents with he lato of any rootrs and igusestoreach thi‘agt.
Acseding
to 4 US Deparment of Defence report es than 1 of incidents ae entiied bat 65%
ofthese are succes
Avotbet thing wo bea ind wih eters and hacker that they donot spec geopraptical
raise
boundaries, or time zones. They may be peagmplicallydlocted from the point of tack
and teefre operating
in off” tous
The thing to remember with scuriy is that he system administrators must gett rght
all he tne; the
fntrder mst ge tright jt onse. Evidence of his is cay to ind In 1997, «teenager
hacked ito a Bll Atantc
‘network, is bcking crashed the computer and esulted in 600 homcs, a regonal aor
and emergency sence
being without elephonecommaniations fr six bors And what was the puishnent fr this
offence? Two years
obeton commenty service anda fine of USSS00
E. Goverment a
ting tough on yber cries, especialy nthe wake of September II", These ries a
‘sing linked national sear, which the US is ow of majo concer fo government oficils
and the general
‘abl like, Ad the goverment bs teen swift to ast I ae 2001, the US Prot Act was
nrodced. This Act
Increased th imo sentence for breaking nt compar from five to en yar. Then nly 200,
he owe
‘of Representatives approved the Cyber Security Enhancement Act. Now if cybercrime
ress the death of
vidual, he ofender coud face aie sentence, There his Deon ational fallout frm the
September 11°
‘tacks withthe FB] and oer government secunty agencies dramatically escalating thei
monitoring ofthe
Tntrnt. This hus pashed sons hackers frther underground, fearful tat what they had
previeusly been Jing out
cof boredom or challenge coal oa be viewed as an atf trois
F. On the other hand, the events of September 1 hve ldo some exhackers sing thir
extensive knowledge
and experene to join force with security forces oad the ight agaist eos
G. However cen with the ines teats of punishment, computer viewed incidents of
hacking coniane
to’be widzopread. Longtime ecuiysisires which Bave been lac by companies and
iodvidals ae tot
filsafe, One of the moe prevalent 1 security measures isthe use of ficvals, which
ter” the daa entering
leaving the corporne IS. 1 strut hve Seva havea number f advantages, nevertheless,
they should nat
59
be seen ata panacea to all scewly woos, merely an enhancement, The can provides als
Senco seurity and
ave limited protection from internal stackes In shor, the corporate world needs to
reali that computer
security will bean on-going problem and expense
- elicit cr cai
secutity will be an on-going problem an expense.
[Questions 1
| Dato | Event
Internet usage
|
E eae “|
In Reading Passage 1 there are several sections. Choose the most suitable heading
(I~ IX) from the box
‘below which best matches the Sections A~G. White your answers in boxes 4~9on your
Answer Sheet.
NOTE: there are more headings than sections so you will not use all of them. You
may use any of
the headings more than once.
1
0
rg
wv
v
vw
va
vm
x
LIST OF HEADINGS
Hackers v administrators
Difficulty of detection
Government agencies
‘Common security measure