Software vulnerabilities, Computer Network Security

Assignment Help:

1.  We used the National Vulnerability Database. Select a recent vulnerability from that Database and analyse it from the following aspects:

  • Criticality level
  • Impact including CVSS Score. Additionally, explain the purpose of using CVSS scores.
  • Proposed Solution
  • Which of the Australian DSD '35 Strategies can be applied to mitigate the vulnerability.

Include valid explanations for your answer.

Ensure that you also provide a detailed description of the vulnerability.

2. Search a number of antivirus companies' (e.g. Symantec, McAfee, Kaspersky, F-Secure, AVG,  BitDefender, Webroot, ESET, G-Data, Avira) websites. Find at least four sites that offer malware listings, and compare the latest malware lists. Discuss how descriptive they are, which site is the most informative and up-to-date, what is the time difference between the sites' lists? 

3.  Select a recent vulnerability from an antivirus company's database, and analyse it from the same aspects as in question 1.  

4.  Select three recent, different threats from an antivirus company's database. Describe for each

(i) how it spreads (attack strategy)

(ii) The target of malicious activity (information, resource etc)

(iii) The way of hiding inside the victim's computer.  

To support your arguments

  • provide screen-dumps for each question (maximum four screen dumps per question; each screen dump must be large enough to read the text)
  • provide references (URLs) when you use information from different sources.

Related Discussions:- Software vulnerabilities

Network analysis and network representation of a project, Question: Net...

Question: Network diagrams combine with a set of systematic analysis procedures, serve to remedy the shortcomings of the Gantt chart. Explain the following terms used in the ne

Explain belady''s anomaly, Belady's Anomaly Also known FIFO anomaly. G...

Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page

Udp encapsulation, UDP ENCAPSULATION As given in the figure below, UDP...

UDP ENCAPSULATION As given in the figure below, UDP packet is included in IP datagram and the IP datagram is then attached in the Frame.

Computer Security, I have an assignment of Computer Security to submit. Wil...

I have an assignment of Computer Security to submit. Will you guys help me making my assignment???

Placeholders for the plaintext characters, Encode the following plaintext, ...

Encode the following plaintext, using the Caesar cipher:             LORD OF THE RINGS b) The following ciphertext              jw njbh lxmn cx kanjt has been encoded usi

Area subdivision, the advantages and disadvantages of area subdivision and ...

the advantages and disadvantages of area subdivision and where it is applicable

Gateways, Gateways They transfer packets among network machines that h...

Gateways They transfer packets among network machines that have different protocols (e.g. between a WAN and a LAN). They access a packet formatted for one protocol and change

Draw the waveform for an asynchronous transmission, QUESTION: (a) For ...

QUESTION: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume that the signal level for a space in NRZ-L is positive; the signal level f

Professional issues in information technology, Thinking ethically is diffic...

Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a t

Find the services implemented on your computer, Question: (a) Which typ...

Question: (a) Which type of attacker represents the most likely and most damaging risk to your network? (b) What is the basic reason that social engineering attacks succeed?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd