Analyse and discuss common emerging threats

Assignment Help Other Subject
Reference no: EM132955408 , Length: word count:1800

MN502 Overview of Network Security

Assessment - Emerging threats, attacks, and countermeasures

Students should be able to demonstrate their achievements in the following unit learning outcome:

b. Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in networked information systems

Assignment Description

Assignment 1 is divided into two parts. Part A focuses on Preventing Vishing Attacks and Part B is about Crypto-malware Attacks and Countermeasures.

Assignment 1-Part A: Preventing Vishing Attacks

Vishing, or voice phishing, continues to increase as an attack against users. What would you do to help prevent users from becoming victims? First, access the online SoundCloud repository that contains five different recordings for vishing attacks. After listening to several of the recordings, based on your analysis address the following:

• What attackers typically ask and how they craft their attacks?
• What messages do the attacker commonly use?
• How do attackers trick users into entering the information?
• Write your recommendations that would help users resist these attacks.

Assignment 1-Part B: Crypto-malware Attacks and Countermeasures
Most recently, threat actors have started using Crypto-malware to attack victims' devices and
networks. Use Library/Internet resources to research about Crypto-malware Attacks. For this part of the assignment, write a report by addressing the following points:
• Addressing the feedback provided in Part A of the assignment
• What do these attacks do? How these attacks are different from other malware attacks? Why are they so successful? In what ways ransom is paid?
• Explain in detail the spreading mechanism(s) of crypto malware.
• Discuss any two crypto malware variants developed during 2019-2021. Critically analyse their working mechanism.
• Analyse and discuss a case study related to recent crypto-malware attack.
• Recommend any two security tools/techniques to withstand with crypto-malware attacks.

Assignment Instructions:
• Must consider at least eight current references (three for part A and five for part B) from journal/conference papers and books. Must follow IEEE referencing style.

Attachment:- Overview of Network Security.rar

Reference no: EM132955408

Questions Cloud

Describe background and the objectives of the case projet : Describe background and the objectives of the case projet - What is the delivery method of this project? Why this project delivery method is chosen for the case
What is the expected market value : Longevity, Inc.'s retirement investment options are expected to earn a 12% rate of return. What is the expected Market Value in year 30 under each option
What does responsibility accounting hold manager responsible : For what does responsibility accounting hold managers responsible? All costs charged to a manager's subunit plus a share of company-wide fixed costs
What is the euro-yen cross rate : The dollar-euro exchange rate is $1.00 = €0.8 and the dollar-yen exchange rate is ¥100 = $1.00. What is the euro-yen cross rate
Analyse and discuss common emerging threats : reventing Vishing Attacks - Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in networked information systems
Prepare an incremental analysis for the special order : Prepare an incremental analysis for the special order. Sandhill Inc. manufactures basketballs for the Women's National Basketball
What is the amount of the payment in us dollars : At the time the contract payment was due, the spot exchange rate was $1.7975/£. What is the amount of the payment in US dollars
Identify two macro-environmental trends : Identify two macro-environmental trends that could impact on strategy in this company or industry. Provide details on how these trends would have impact
Calculate the market risk premium : Question - Stock A has a beta of 0.6, and investors expect it to return 10%. Stock B has a beta of 1.4, Calculate the market risk premium

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd