Nan Hu

ITS 370

Shin-Ping Tucker



1.        Look up “the paper that started the study of computer security.” Prepare a summary of the key points. What in this paper specifically addresses security in previously unexamined areas?

      Any program or user on the network computers can access any other program or subsystem connected in the network without changing the program.

          To create techniques and develop experience on interconnecting computers.

                      To improve and increase computer research productivity by sharing resources.


             Unexamined yet:

             Less security for dial-up users.

             Non-existent for user identification

             Lack of formatting password and structure


2.       Using the Web, identify the chief information officer (CIO), chief information security officer (CISO), and systems administration for your school. Which of these people represents the data owner? Which represents the data custodian?

The CIO is Tom Janicki

Didn’t find CISO for UWS.

System Administrator is Ross Eaton


3.       Using the Web, find a large company or government agency that is familiar to you or located in your area. Try to find the name of the chief executive officer (CEO), the CIO, and the CISO. Which was easiest to find? Which was the hardest?

Company: apple

The CEO is Tim Cook

The CIO is Niall O’Connor

The CISO is George Stathakopoulos

CEO easiest, Ciso hardest


4.       Using the Web, find out more about Kevin Mitnick. What did he do? Who caught him? Write a short summary of his activities and explain why he is infamous.

He is an American computer security consultant, author and hacker, best known for his high profile 1995 arrest and later five years in prison for various computer and communications-related crimes. According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country's largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mails. He is the CEO of Mitnick Security Consulting

 Tsutomu Shimomura known for helping the FBI track and arrest hacker Kevin Mitnick. Shimomura was a founder of Neofocal Systems. 


5.       Using the Web, explore the technique known as “iterative and incremental development.” Then, investigate “agile development.” How are they related?

         terative and Incremental development is any combination of both iterative design or iterative method and incremental build model for software development. The combination is of long standing and has been widely suggested for large development efforts. For example, the 1985 DOD-STD-2167 mentions (in section 4.1.2): "During software development, more than one iteration of the software development cycle may be in progress at the same time." and "This process may be described as an 'evolutionary acquisition' or 'incremental build' approach." The relationship between iterations and increments is determined by the overall software development methodologyand software development process. The exact number and nature of the particular incremental builds and what is iterated will be specific to each individual development effort.