Analyze what stride aspects apply to the vulnerability

Assignment Help Computer Engineering
Reference no: EM133581831

Assignment: Vulnerability Case Study & PowerPoint Presentation

Vulnerability Case Study

For the project, 15 minute presentation, a Powerpoint presentation (< 15 slides), and an annotated bibliography of the sources upon which you rely.

The Vulnerability you have to work on is CVE-2023-20198 Detail.

Subject Matter:

Your task is to research a known exploit of a vulnerability from within the past 3 years.

1. A high-level description of the vulnerability

2. A more detailed discussion of the vulnerability. You should start by looking up the CVE in the National Vulnerability Database and use that as a way to find additional references.

3. Analyze what STRIDE aspects apply to the vulnerability

4. Analyze what aspects of the CIA triad were impacted

5. How the vulnerability was discovered and disclosed

6. How it was exploited and the impact

7. How it was resolved

Research Process:

Your research should be done in a few separate phases:

A. Start with a general search to find an interesting case for analysis. You can Google for news stories, look at Google Project Zero, security focused blogs, newsletters, or YouTube channels, and similar sources to find a high-level discussion.

B. Find the CVE in the National Vulnerability Database. This will be a key step in getting sufficient technical details about the vulnerability and will lead you to additional resources.

C. Look for third party analysis, discussion of exploits, responses from the product owner, patches, and other related information pertaining to the vulnerability. Again, the CVE will be a good resource for this part.

As you find relevant sources that you will use, add it to the bibliography with a brief annotation. The annotation should provide a high-level summary of the source and why the purpose for which you are using the source. It could be helpful to highlight key quotes and/or excerpts as well.

Presentation and Slides:

Once you have done your research and conducted your analysis, the next step is to prepare the presentation. Prepare a Powerpoint presentation (should be around 12 to 15 slides). Slides should be organized. Slides should provide short bullet points -- do not write paragraphs on the slide and read off of them. Relevant visuals and graphics that enhance the discussion are always welcome.

Reference no: EM133581831

Questions Cloud

Discuss why understanding the theoretical concepts : Discuss why understanding the theoretical concepts during the design process is an important facet of successful database implementation.
Describe in detail the process of implementing the proposed : Describe in detail the process of implementing the proposed changes undertaken in the operationalization stages of nurse burnout. Be sure you include
Discuss why understanding the theoretical concepts : Discuss why understanding the theoretical concepts during the design process is an important facet of successful database implementation.
Describe the goals of the us constitution : Describe the goals of the US Constitution as discussed in the lectures. How do all of the articles of the Constitution help to realize those goals?
Analyze what stride aspects apply to the vulnerability : Analyze what STRIDE aspects apply to the vulnerability. Analyze what aspects of the CIA triad were impacted. How the vulnerability was discovered and disclosed.
Pre-confederation canadian history : The task is to choose someone from Pre-Confederation Canadian history and write an argument about whether or not that person should be remembered
What level of risk does this patient have for developing : The patient scores 3 points. Based on this assessment, what level of risk does this patient have for developing opioid abuse? High risk Low risk Moderate risk
Anointing of the sick are characteristic ritual observances : Baptism, Eucharist, Confirmation, Marriage, Holy Orders, Reconciliation and the Anointing of the Sick are characteristic ritual observances
Describe some circumstances from your adolescence : Choose one of the four arenas of identity formation (faith, vocation, politics or gender role). Within the arena you have chosen, describe some circumstances

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd