Software vulnerabilities, Computer Network Security

Assignment Help:

1.  We used the National Vulnerability Database. Select a recent vulnerability from that Database and analyse it from the following aspects:

  • Criticality level
  • Impact including CVSS Score. Additionally, explain the purpose of using CVSS scores.
  • Proposed Solution
  • Which of the Australian DSD '35 Strategies can be applied to mitigate the vulnerability.

Include valid explanations for your answer.

Ensure that you also provide a detailed description of the vulnerability.

2. Search a number of antivirus companies' (e.g. Symantec, McAfee, Kaspersky, F-Secure, AVG,  BitDefender, Webroot, ESET, G-Data, Avira) websites. Find at least four sites that offer malware listings, and compare the latest malware lists. Discuss how descriptive they are, which site is the most informative and up-to-date, what is the time difference between the sites' lists? 

3.  Select a recent vulnerability from an antivirus company's database, and analyse it from the same aspects as in question 1.  

4.  Select three recent, different threats from an antivirus company's database. Describe for each

(i) how it spreads (attack strategy)

(ii) The target of malicious activity (information, resource etc)

(iii) The way of hiding inside the victim's computer.  

To support your arguments

  • provide screen-dumps for each question (maximum four screen dumps per question; each screen dump must be large enough to read the text)
  • provide references (URLs) when you use information from different sources.

Related Discussions:- Software vulnerabilities

Placeholders for the plaintext characters, Encode the following plaintext, ...

Encode the following plaintext, using the Caesar cipher:             LORD OF THE RINGS b) The following ciphertext              jw njbh lxmn cx kanjt has been encoded usi

Wan architecture and wan service, MegaCorp INC. is a large manufacturing f...

MegaCorp INC. is a large manufacturing firm that operates 5 factories in Dallas, 4  factories in Los Angeles, and 5 factories in Albany, New York.  It operates a tightly  connected

Example bus network , Ethernet is a commonly used LAN technology. It was di...

Ethernet is a commonly used LAN technology. It was discovered at EXROX PARC(Palo Alto Research Center) in 1970s.Xerox, Intel and Digital described it in a standard so it is also kn

CNSS Security model, "Using the CNSS Model, examine each of the cells and w...

"Using the CNSS Model, examine each of the cells and write a brief statement on how you would address the components respesented in that cell"

CS, Discuss how developers should apply the following countermeasures to im...

Discuss how developers should apply the following countermeasures to improve the security of their code:

Tomcat server, how to access tomcat by internet

how to access tomcat by internet

Difference between a class profile and a child profile sheet, QUESTION ...

QUESTION (a) Mention two attitudes of a carer towards an inspector that could lead to negative outcomes (b) Give two performance indicators of Early Childhood Education that

Layering, ADDRESS RESOLUTION AND PROTOCOL ADDRESSES Address resolution...

ADDRESS RESOLUTION AND PROTOCOL ADDRESSES Address resolution (ARP) is a network interface layer protocol. Protocol addresses are used in all upper layers. Address resolution s

Describe how ethernet deals with collisions, Problem (a) The IEEE 802 seri...

Problem (a) The IEEE 802 series of standards describe both the Physical and Data Link layers of their respective technologies. Two important standards are 802.3 and 802.5, respect

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd