CS 493, Fall 2003 Assignment #2: 10 points Due Date: Thursday, 9/25/03. (2) 1. Research the University of Alaska computer security and acceptable use policies. Compile a bibliography of all relevant policies, including a short (one sentence) summary of each policy. (2) 2. Under which policies could UAF justify termination of network services to: (a) a computer infected with a virus; (b) a computer sharing files via kazaa? (2) 3. The Information Assurance Lab is set up as an isolated local network without access to UAF or the internet. Why was this done? Cite policies and scenarios that support this decision. (2) 4. Join the UA-CIRT email list to receive security announcements. (You will only be able to receive, and not post, announcements. Posting requires approval of the list administrator.) After you have received the announcements for a few days, summarize the three most frequently occurring types of announcements. (2) 5. Login to a workstation in the IA lab. Perform a scan of the network to determine (a) the IP addresses of all machines on the network and (b) the O/S running on each machine at the time of the scan.