BISY3006/ISY2003/ISY203 Information Security @ Australian Institute of Higher Education, Sydney
Total Marks: 30 (6%)
Submit your answers to the following questions by Week-7 Friday 5:00PM. Late submissions will incur 5% deduction with each passing day till Week-8 Friday 5:00PM, after which no submissions will be accepted.
Warning: Plagiarism is a serious ethical offense with dire consequences. Do not copy and paste from your textbook, online resources, or your friend’s work. Cite and provide reference (Harvard Style) to the original work where applicable.
Q. #1: Go to page 195 of your e-textbook*, explain Figure 5-2 in the context of Man-in-the-
Middle attack in your own words. (10 Marks)
Q. #2: Go to page 200 of your e-textbook*, explain Figure 5-4 in the context of DNS
poisoning. (10 Marks)
Q. #3: Go to page 203 of your e-textbook*, explain Figure 5-5 in the context of Denial of
Service attack. (10 Marks)
* Ciampa, M. (2018), Security + Guide to network security fundamentals 6th edn. Cengage Learning, United States.
Get access to your e-textbook on Moodle by going to Information Security unit > E-text tile.