Explain the purpose of using cvss scores

Assignment Help Computer Network Security
Reference no: EM1388606

Part- A

During the labs we used the National Vulnerability Database. Select a recent vulnerability from that Database and analyse it from the following aspects:

• What problems they can cause (malicious activities an attacker may use them for, including attack types)
• Criticality level
• Impact including CVSS Score.**
• Proposed Solution
• Which of the Australian DSD '35 Strategies can be applied to mitigate the vulnerability. You must explain why the solution mitigated the vulnerability.

Include valid explanations and sources for your answer.

**Note: When stating the Impact, you must provide the following information:

CVSS v2 Base Score (specified if available)

Impact Subscore (specified if available)

Exploitability Subscore (specified if available)

Access Vector (specified if available)

Access Complexity (specified if available)

Authentication (specified if available)

Impact Type (specified if available)

Part - B

Explain the purpose of using CVSS scores.

Reference no: EM1388606

Questions Cloud

Twice as many fishing boat as ski boat respectively : The company has incurred fixed costs of $2,800,000 to set up its manufacturing operation.If company plans to produce twice as many fishing boat as ski boat respectively with propotion 2:1:1
Lichen diversity and abundance to measure air quality : Discuss how could you use lichen diversity and abundance to measure air quality? How would you expect lichen diversity to vary with respect to distance from the major metropolitan areas?
What is the frequency of the beat note : Two ambulances move toward each other on a straight road. Each travels at a speed of 65 mph. The siren on each ambulance produces a sound wave of frequency 460 Hz. (Take the speed of sound in air to be 340 m/s.)
Healthcare manager decision making : Researching further for more information, research the Centers of Disease Control and Prevention or the World Health Organization data and statistics relating to the national and global findings.
Explain the purpose of using cvss scores : Select a recent vulnerability from that Database and analyse it from the what problems they can cause (malicious activities an attacker may use them for, including attack types)
Living organisms to control pests : Use living organisms to control pests are often used in many nations. What factors must be taken into account in using fungi to combat agricultural pests?
Anatomical and chemical traits : Assyme you are shown an object that looks superficially like a pale green mushroom. Explain at least three criteria that would enable you to tell whether the object is a piece of a plant or a piece of a fungus.
At what angular speed should it spin : If the arm is 5.50-m long and pivots about one end, at what angular speed (in rpm) should it spin so that the acceleration of the lander is the equal as acceleration because of gravity at the surface of Europa? The mass of Europa is 4.8 times 10^ ..
Find the median grade point average : The grade point averages of 10 students are listed below. Find the median grade point average. 3.15, 3.62, 2.54, 2.81, 3.97, 1.85, 1.93, 2.63, 2.50, 2.80

Reviews

Write a Review

Computer Network Security Questions & Answers

  Turtle shell architecture

Turtle Shell Architecture, zero-byte representation, Access Control List, DNS Cache Poisoning attack, 16-pass iterative and 9-pass recursive PHP function

  Ideas for energizing a project team

Assume you are introduced to a assignment manager, who does not have authority to give a pay raise or promote a project team member.

  Academic method to project management

Sunnyville Corporation is in the business of selling home appliances. Sunnyville Corporation  has over 50 sales agents across the country. The management at Sunnyville Corporation has decided to implement an online sales program.

  Describe the life cycle of an information system

Suppose that you run a photography printing store. Your workers have been using punch cards for time entry since you started the business.

  Protecting intellectual property rights in software

Explain the reason of each of these approaches and explain how each of them can be used to protect property rights in software. Please include any experiences you have had with these methods.

  How to collect data for traffic analysis

Suppose a terrorist is known to use Skype for encrypted email from internet cafes, using a known email ID in small city. How could you collect data for traffic analysis (i. e, what kind of technology or access could you use)?

  Technical versus soft skills

Suppose that there is some consensus with basic premise that most skills can be learnt, which would you expect to be the more productive task,

  Determine primary security risk that users must acknowledge

Based on the article by Lenning (2005), determine a primary security risk that users must acknowledge when using macros? Why is it significant to educate users of these risks once their dilemma is resolved?

  Calculate the crc or fcs for the sender

The pattern or generator is P 1001. Calculate the CRC or FCS for the sender. You must give the details of this calculation.

  Analyse security procedures

Analyse security procedures

  Certification and accreditation for commercial systems

Using Network Security Certification and Accreditation for commercial systems. Do you think a formal process like Certification & Accreditation is appropriate to use for commercial systems in private industry (Why or Why Not)?

  Using vigene table to find key used to encrypt message

You were given the following plaintext and cipertext, and you are needed to find key used by them. plaintext: Using Vigene table, find key used by them to encrypt the message.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd