Reference no: EM131594918
Discussion 1: "Scareware and Famous Threats"
Please respond to the following:
1. Determine how scareware has become a serious threat and why you believe end users often fall victim to this form of hoax.
2. From the e-Activity (listed below), discuss the different famous malware threats, the specifics of each threat, how they worked, why they were or weren't successful, and how they were eventually defeated. Compare and contrast the two selected malware threats and explain which you believe was the stronger threat and why.
E-Activity
Use the Internet to research at least two different famous malware threats (e.g., Code Red). Pay close attention to the specifics of each threat, how it worked, why it was or wasn't successful, and how it was eventually defeated.
Discussion 2: "The Trojan Threat"
Please respond to the following:
1. Consider the need for education in protecting against all types of malware. Determine whether or not you believe security departments are properly educating employees on common threats.
2. Determine whether or not you believe bit torrent sharing networks are a breeding ground for Trojan proliferation and if so, suggest what can be done to mitigate the risks. Justify your response.
Discussion 3: "Botnet Defense"
Please respond to the following:
1. Analyze honeypotting to determine if it is an optimal detection method of botnets and justify your answer. As a security director, explain whether or not you would consider implementing a honeypot as a security control and why.
2. From the first e-Activity (listed below), describe the privacy concerns with Internet service provider (ISP) packet detection. Decide whether or not you believe the government should demand ISPs to take more of a proactive approach in detecting and protecting against botnets. Provide a rationale with your response.
E-Activity
Watch the video titled "Assessing the botnet threat" (10 min 52 s), found on the Search Security Website.
What will be the effect on profit of accepting the order
: PowerDrive, Inc. produces a hard disk drive that sells for $175 per unit. Required - What will be the effect on profit of accepting the order
|
Explain how security personnel could use the tool
: Discuss tool's primary uses, strengths and weaknesses and competing products. Explain how security personnel could use the tool and how hackers could use it.
|
Plot amplitude frequency characteristics
: Determine the impulse response of an ideal discrete-time lowpass filter with a cut-off frequency of ?c = 1 radian/s. Using a rectangular window.
|
Current - voltage ratings of each pin
: Provide a description of each pin of the DIP and explain how each pin is used to interface with the microcontroller
|
Discuss the different famous malware threats
: Discuss different famous malware threats, specifics of each threat, how they worked, why they were or weren't successful, and how they were eventually defeated.
|
What is the price
: Demand is estimated to be 100,000 units annually. What is the price if a markup of 40% on total cost is used to determine the price
|
What is the payback period of this investment
: You are considering making a movie. The movie is expected to cost $10.8 million upfront and take a year to make. What is the payback period of this investment
|
Calculate the magnitude and phase spectra for the filter
: Given the flow graph in Fig., calculate the transfer function and the impulse response of the LTI system of the realization.
|
Bluffing-market timing and late trading and spoofing
: Bluffing, Market timing and late trading, Spoofing, Market Manipulation.
|