Identify the exploited vulnerability and its attack vector

Assignment Help Computer Engineering
Reference no: EM132693664

Assignment 1: Playbooks, sometimes known as Standing Operating Procedures (SOP) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, or diagrams, all of which make it easy to follow troubleshooting instructions.

Throughout the next 4 weeks, you will develop a playbook for a fictional company that hired you to write their playbooks and manage the team. The first portion of the playbook is a response to malware at the company.

Outline a 2- to 3-page playbook in which a malware attack of your choice occurs.

Complete the following in your outline:

• Provide details of the malware.

• Identify the exploited vulnerability and its attack vector.

• Analyze the vulnerability to determine 2 risks of this malware.

• Outline step-by-step instructions on how to resolve the malware attack.

Remember, numbered or bulleted steps or guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps and guidelines.

Note: You will use content from this #1 assignment as part of the #2 Signature Assignment

Assignment 2: Online interactions pose a threat to all servers. Some risks can occur when employees use social networking, web browsing, and email. Playbooks typically cover a section related to threats and defenses of online interactions.

In this next section of your playbook, outline steps to take when an employee reports clicking on a website that appeared in an email that was received.

Include the following information in this section:

• Describe 2 threats this interaction poses on the company.

• Provide step-by-step instructions on how to mitigate each interaction.

Remember, numbered or bulleted steps or guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps or guidelines.

Combine This assignment #2 with your revised assignment #1 -

Apply: Malware Attacks sections of your Playbook

Cite at least 2 resources to support each assignment.

Format each assignment according to APA guidelines.

Reference no: EM132693664

Questions Cloud

Calculate the total cost of each of the three jobs : Whitley has recently completed work for three clients: Harrison, Barnes, and Tyler. Calculate the total cost of each of the three jobs
How you managing financial transaction and group activities : Document a banking Application is a software majorly for controlling and managing financial transaction and a group activities? It will focus on the major.
Elaborate on two or more logical fallacies : Elaborate on two or more logical fallacies that are specifically a challenge to you.
Authentic personal statements : Ph.D. candidates should provide authentic personal statements to each of the five following questions/prompts reflecting on their own personal interests.
Identify the exploited vulnerability and its attack vector : Playbooks, sometimes known as Standing Operating Procedures (SOP) or runbooks, are used for troubleshooting common issues. They are often created by a team.
Differences between school climate and school culture : Explain the similarities and differences between a school's climate and a school's culture.
Describe the homework assignment and learning activity : Describe the homework assignment/learning activity, and how the assignment/learning activity engages the family and community
Where is the software really developed and by whom : Where is the software really developed and by whom? How many are involved in the development of Adobe and what threat might that pose to end users?
Describe the type and risks of the executable programs : In a 500- to 750-word essay, describe the type and risks of the executable programs and adware to the user. Explain why this is legal.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd