Reference no: EM132955408 , Length: word count:1800
MN502 Overview of Network Security
Assessment - Emerging threats, attacks, and countermeasures
Students should be able to demonstrate their achievements in the following unit learning outcome:
b. Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in networked information systems
Assignment Description
Assignment 1 is divided into two parts. Part A focuses on Preventing Vishing Attacks and Part B is about Crypto-malware Attacks and Countermeasures.
Assignment 1-Part A: Preventing Vishing Attacks
Vishing, or voice phishing, continues to increase as an attack against users. What would you do to help prevent users from becoming victims? First, access the online SoundCloud repository that contains five different recordings for vishing attacks. After listening to several of the recordings, based on your analysis address the following:
• What attackers typically ask and how they craft their attacks?
• What messages do the attacker commonly use?
• How do attackers trick users into entering the information?
• Write your recommendations that would help users resist these attacks.
Assignment 1-Part B: Crypto-malware Attacks and Countermeasures
Most recently, threat actors have started using Crypto-malware to attack victims' devices and
networks. Use Library/Internet resources to research about Crypto-malware Attacks. For this part of the assignment, write a report by addressing the following points:
• Addressing the feedback provided in Part A of the assignment
• What do these attacks do? How these attacks are different from other malware attacks? Why are they so successful? In what ways ransom is paid?
• Explain in detail the spreading mechanism(s) of crypto malware.
• Discuss any two crypto malware variants developed during 2019-2021. Critically analyse their working mechanism.
• Analyse and discuss a case study related to recent crypto-malware attack.
• Recommend any two security tools/techniques to withstand with crypto-malware attacks.
Assignment Instructions:
• Must consider at least eight current references (three for part A and five for part B) from journal/conference papers and books. Must follow IEEE referencing style.
Attachment:- Overview of Network Security.rar