Discuss the different famous malware threats

Assignment Help Management Information Sys
Reference no: EM131594918

Discussion 1: "Scareware and Famous Threats"

Please respond to the following:

1. Determine how scareware has become a serious threat and why you believe end users often fall victim to this form of hoax.

2. From the e-Activity (listed below), discuss the different famous malware threats, the specifics of each threat, how they worked, why they were or weren't successful, and how they were eventually defeated. Compare and contrast the two selected malware threats and explain which you believe was the stronger threat and why.

E-Activity

Use the Internet to research at least two different famous malware threats (e.g., Code Red). Pay close attention to the specifics of each threat, how it worked, why it was or wasn't successful, and how it was eventually defeated.

Discussion 2: "The Trojan Threat"

Please respond to the following:

1. Consider the need for education in protecting against all types of malware. Determine whether or not you believe security departments are properly educating employees on common threats.

2. Determine whether or not you believe bit torrent sharing networks are a breeding ground for Trojan proliferation and if so, suggest what can be done to mitigate the risks. Justify your response.

Discussion 3: "Botnet Defense"

Please respond to the following:

1. Analyze honeypotting to determine if it is an optimal detection method of botnets and justify your answer. As a security director, explain whether or not you would consider implementing a honeypot as a security control and why.

2. From the first e-Activity (listed below), describe the privacy concerns with Internet service provider (ISP) packet detection. Decide whether or not you believe the government should demand ISPs to take more of a proactive approach in detecting and protecting against botnets. Provide a rationale with your response.

E-Activity

Watch the video titled "Assessing the botnet threat" (10 min 52 s), found on the Search Security Website.

Reference no: EM131594918

Questions Cloud

What will be the effect on profit of accepting the order : PowerDrive, Inc. produces a hard disk drive that sells for $175 per unit. Required - What will be the effect on profit of accepting the order
Explain how security personnel could use the tool : Discuss tool's primary uses, strengths and weaknesses and competing products. Explain how security personnel could use the tool and how hackers could use it.
Plot amplitude frequency characteristics : Determine the impulse response of an ideal discrete-time lowpass filter with a cut-off frequency of ?c = 1 radian/s. Using a rectangular window.
Current - voltage ratings of each pin : Provide a description of each pin of the DIP and explain how each pin is used to interface with the microcontroller
Discuss the different famous malware threats : Discuss different famous malware threats, specifics of each threat, how they worked, why they were or weren't successful, and how they were eventually defeated.
What is the price : Demand is estimated to be 100,000 units annually. What is the price if a markup of 40% on total cost is used to determine the price
What is the payback period of this investment : You are considering making a movie. The movie is expected to cost $10.8 million upfront and take a year to make. What is the payback period of this investment
Calculate the magnitude and phase spectra for the filter : Given the flow graph in Fig., calculate the transfer function and the impulse response of the LTI system of the realization.
Bluffing-market timing and late trading and spoofing : Bluffing, Market timing and late trading, Spoofing, Market Manipulation.

Reviews

Write a Review

Management Information Sys Questions & Answers

  What are the data entities of this enterprise

Consider a student club or organization in which you are a member. What are the data entities of this enterprise? List and define each entity. Then, develop an enterprise data model showing these entities and important relationships between them.

  Define the purpose of a management information system

Define the purpose of a Management Information System (MIS). Describe the organizational problem either caused by an inefficient MIS or requiring a MIS solution. Describe the impact of the organizational inefficiency. Provide reasons why the organiza..

  What components would you purchase

If you could build your own personal computer, what components would you purchase? Put together a list of the components you would use to create it.

  Discuss about creating a policy and procedures manual

Why do you think creating a Policy and Procedures manual is important for Information Security in a business.

  Explain three major advantages to its use

The Relational Database Model is the foundation of all modern DBMSs. Explain three major advantages to its use.

  Discuss appropriateness and effectiveness of visual aids

For the Unit 5 assignment, you will write a reflective analysis paper about your presentation-creation process and your Unit 4 live, oral presentation.

  Describe one or more agile project management approaches

Briefly describe the TPM waterfall method. Briefly describe one or more Agile project management approaches. Compare and contrast TPM and Agile methods, emphasizing the strengths and weaknesses of each.

  Systems analyst role

Systems Analyst Role - What is a systems analyst, and why would anyone want to be one?"

  Enterprise rent-a-car is based in st louis missouri and

enterprise rent-a-car is based in st. louis missouri and runs approximately 6900 branch offices around the world.

  Describe component of comprehensive business continuity plan

Describe the key components of a comprehensive business continuity plan for an attack or incident which could affect Sunshine Machine Work's network and data.

  Compare the parity check matrix

Despite this difference, both waveforms are denoted by g(t), which implies they both have exactly the same total energy, to be demonstrated next.

  Explore a health information management career

Explore a Health Information Management Career - Identified and discussed the coder credential organizations.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd