SlideShare a Scribd company logo
1 of 1
Download to read offline
B) Using the data element information above. Search the various total to check and see if any of
the elements listed above classifies as an IOC. (Find 3 malicious file hashes and 3 malicious IPs).
- What security vendors marked the data element as malicious? (Take screenshots) - Click on the
community tab, to check and see if the community agrees that the data element is indeed
malicious. (Take screenshots) C) Cisco Talos is a web reputation center. Most companies will
have their security tools pull on the web reputation reading given by Cisco Talos. If an
unfavorable score has been presented to the web entities in question, firewalls and proxy servers
will block those sites. Common Questions What are the Wob Reputation Threat Levcla? then D)
Try finding three untrusted IPs from the data elements listed above (IPs only, as cisco Talos only
deals with IPs/domain names/e-mail addresses/ and online data elements) using the cisco talso
search. Cisco talos search URL. Also try searching things like RBC.com TDbank.com CNN.com
google.com etc.. (take a screenshot of the reputation score).

More Related Content

Similar to B) Using the data element information above. Search the various total.pdf

Assignment 1 Developing the Corporate Strategy for Information Secu.docx
Assignment 1 Developing the Corporate Strategy for Information Secu.docxAssignment 1 Developing the Corporate Strategy for Information Secu.docx
Assignment 1 Developing the Corporate Strategy for Information Secu.docxmurgatroydcrista
 
Cis 333 Education Redefined - snaptutorial.com
Cis 333     Education Redefined - snaptutorial.comCis 333     Education Redefined - snaptutorial.com
Cis 333 Education Redefined - snaptutorial.comDavisMurphyC75
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comRobinson069
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comGeorgeDixon99
 
27.2.12 lab interpret http and dns data to isolate threat actor
27.2.12 lab   interpret http and dns data to isolate threat actor27.2.12 lab   interpret http and dns data to isolate threat actor
27.2.12 lab interpret http and dns data to isolate threat actorFreddy Buenaño
 
Hacking databases
Hacking databasesHacking databases
Hacking databasessunil kumar
 
Hacking databases
Hacking databasesHacking databases
Hacking databasessunil kumar
 
27.2.15 lab investigating a malware exploit
27.2.15 lab   investigating a malware exploit27.2.15 lab   investigating a malware exploit
27.2.15 lab investigating a malware exploitFreddy Buenaño
 
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedLayer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedfangjiafu
 
Cyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsCyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsLinkurious
 
Data leakage detection (synopsis)
Data leakage detection (synopsis)Data leakage detection (synopsis)
Data leakage detection (synopsis)Mumbai Academisc
 
Report - Final_New_phishila
Report - Final_New_phishilaReport - Final_New_phishila
Report - Final_New_phishilaAshwin Palani
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyeBoost Consulting
 
2013 10-03-semantics-meetup-s buxton-mark_logic_pub
2013 10-03-semantics-meetup-s buxton-mark_logic_pub2013 10-03-semantics-meetup-s buxton-mark_logic_pub
2013 10-03-semantics-meetup-s buxton-mark_logic_pubStephen Buxton
 
Title Developing the Corporate Strategy for Information Securit
Title Developing the Corporate Strategy for Information SecuritTitle Developing the Corporate Strategy for Information Securit
Title Developing the Corporate Strategy for Information Securitmarilynnhoare
 
Mis 510 cyber analytics project report
Mis 510 cyber analytics project report Mis 510 cyber analytics project report
Mis 510 cyber analytics project report Aadil Hussaini
 
Software Technical Design for Information Security: A short intro for Tech Le...
Software Technical Design for Information Security: A short intro for Tech Le...Software Technical Design for Information Security: A short intro for Tech Le...
Software Technical Design for Information Security: A short intro for Tech Le...Chris F Carroll
 
Don't Fear the Content Audit
Don't Fear the Content AuditDon't Fear the Content Audit
Don't Fear the Content AuditKapost
 
Threat intelligence tool for submission.pdf
Threat intelligence tool for submission.pdfThreat intelligence tool for submission.pdf
Threat intelligence tool for submission.pdfHenryEmekaMba
 
Discussion1) Search scholar.google.com for a company or s
Discussion1) Search scholar.google.com for a company or sDiscussion1) Search scholar.google.com for a company or s
Discussion1) Search scholar.google.com for a company or sclayrhr
 

Similar to B) Using the data element information above. Search the various total.pdf (20)

Assignment 1 Developing the Corporate Strategy for Information Secu.docx
Assignment 1 Developing the Corporate Strategy for Information Secu.docxAssignment 1 Developing the Corporate Strategy for Information Secu.docx
Assignment 1 Developing the Corporate Strategy for Information Secu.docx
 
Cis 333 Education Redefined - snaptutorial.com
Cis 333     Education Redefined - snaptutorial.comCis 333     Education Redefined - snaptutorial.com
Cis 333 Education Redefined - snaptutorial.com
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.com
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.com
 
27.2.12 lab interpret http and dns data to isolate threat actor
27.2.12 lab   interpret http and dns data to isolate threat actor27.2.12 lab   interpret http and dns data to isolate threat actor
27.2.12 lab interpret http and dns data to isolate threat actor
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
 
27.2.15 lab investigating a malware exploit
27.2.15 lab   investigating a malware exploit27.2.15 lab   investigating a malware exploit
27.2.15 lab investigating a malware exploit
 
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedLayer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
 
Cyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsCyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analytics
 
Data leakage detection (synopsis)
Data leakage detection (synopsis)Data leakage detection (synopsis)
Data leakage detection (synopsis)
 
Report - Final_New_phishila
Report - Final_New_phishilaReport - Final_New_phishila
Report - Final_New_phishila
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet Privacy
 
2013 10-03-semantics-meetup-s buxton-mark_logic_pub
2013 10-03-semantics-meetup-s buxton-mark_logic_pub2013 10-03-semantics-meetup-s buxton-mark_logic_pub
2013 10-03-semantics-meetup-s buxton-mark_logic_pub
 
Title Developing the Corporate Strategy for Information Securit
Title Developing the Corporate Strategy for Information SecuritTitle Developing the Corporate Strategy for Information Securit
Title Developing the Corporate Strategy for Information Securit
 
Mis 510 cyber analytics project report
Mis 510 cyber analytics project report Mis 510 cyber analytics project report
Mis 510 cyber analytics project report
 
Software Technical Design for Information Security: A short intro for Tech Le...
Software Technical Design for Information Security: A short intro for Tech Le...Software Technical Design for Information Security: A short intro for Tech Le...
Software Technical Design for Information Security: A short intro for Tech Le...
 
Don't Fear the Content Audit
Don't Fear the Content AuditDon't Fear the Content Audit
Don't Fear the Content Audit
 
Threat intelligence tool for submission.pdf
Threat intelligence tool for submission.pdfThreat intelligence tool for submission.pdf
Threat intelligence tool for submission.pdf
 
Discussion1) Search scholar.google.com for a company or s
Discussion1) Search scholar.google.com for a company or sDiscussion1) Search scholar.google.com for a company or s
Discussion1) Search scholar.google.com for a company or s
 

More from agarwalbeautyshop121

Bank Reconciliation July 31,2022 Cash balance perbank statement $ A.pdf
 Bank Reconciliation July 31,2022 Cash balance perbank statement  $ A.pdf Bank Reconciliation July 31,2022 Cash balance perbank statement  $ A.pdf
Bank Reconciliation July 31,2022 Cash balance perbank statement $ A.pdfagarwalbeautyshop121
 
Bajo las NIIF, �el marco coceptual a. Hace hincapi� en el co.pdf
 Bajo las NIIF, �el marco coceptual a. Hace hincapi� en el co.pdf Bajo las NIIF, �el marco coceptual a. Hace hincapi� en el co.pdf
Bajo las NIIF, �el marco coceptual a. Hace hincapi� en el co.pdfagarwalbeautyshop121
 
Bacterial endospores form when the environment is no longer conducive.pdf
 Bacterial endospores form when the environment is no longer conducive.pdf Bacterial endospores form when the environment is no longer conducive.pdf
Bacterial endospores form when the environment is no longer conducive.pdfagarwalbeautyshop121
 
B. Investigating different scenarios Waterbuck are a large antelope f.pdf
 B. Investigating different scenarios Waterbuck are a large antelope f.pdf B. Investigating different scenarios Waterbuck are a large antelope f.pdf
B. Investigating different scenarios Waterbuck are a large antelope f.pdfagarwalbeautyshop121
 
b) Suppose host A sends some data to host D. What is the frame conten.pdf
 b) Suppose host A sends some data to host D. What is the frame conten.pdf b) Suppose host A sends some data to host D. What is the frame conten.pdf
b) Suppose host A sends some data to host D. What is the frame conten.pdfagarwalbeautyshop121
 
At the peak of the action potential, the cell is permeable to Na+than.pdf
 At the peak of the action potential, the cell is permeable to Na+than.pdf At the peak of the action potential, the cell is permeable to Na+than.pdf
At the peak of the action potential, the cell is permeable to Na+than.pdfagarwalbeautyshop121
 
At the end of 2019, Sentry Company reported a deferred tax liability .pdf
 At the end of 2019, Sentry Company reported a deferred tax liability .pdf At the end of 2019, Sentry Company reported a deferred tax liability .pdf
At the end of 2019, Sentry Company reported a deferred tax liability .pdfagarwalbeautyshop121
 
At one point, certain U.S. Treasury bonds were callable. Consider the.pdf
 At one point, certain U.S. Treasury bonds were callable. Consider the.pdf At one point, certain U.S. Treasury bonds were callable. Consider the.pdf
At one point, certain U.S. Treasury bonds were callable. Consider the.pdfagarwalbeautyshop121
 
At the beginning of its first year of operations, Buffalo Limited has.pdf
 At the beginning of its first year of operations, Buffalo Limited has.pdf At the beginning of its first year of operations, Buffalo Limited has.pdf
At the beginning of its first year of operations, Buffalo Limited has.pdfagarwalbeautyshop121
 
At 0C to 4C (refrigeration temperature) the growth of most human path.pdf
 At 0C to 4C (refrigeration temperature) the growth of most human path.pdf At 0C to 4C (refrigeration temperature) the growth of most human path.pdf
At 0C to 4C (refrigeration temperature) the growth of most human path.pdfagarwalbeautyshop121
 
Assume the values of integer variable sum is associated with the re.pdf
 Assume the values of integer variable sum is associated with the re.pdf Assume the values of integer variable sum is associated with the re.pdf
Assume the values of integer variable sum is associated with the re.pdfagarwalbeautyshop121
 
Assume that the population proportion is 0.55 . Compute the standard .pdf
 Assume that the population proportion is 0.55 . Compute the standard .pdf Assume that the population proportion is 0.55 . Compute the standard .pdf
Assume that the population proportion is 0.55 . Compute the standard .pdfagarwalbeautyshop121
 
ASE 1. Why is Maersks business model complex 2. What role do lot .pdf
 ASE 1. Why is Maersks business model complex 2. What role do lot .pdf ASE 1. Why is Maersks business model complex 2. What role do lot .pdf
ASE 1. Why is Maersks business model complex 2. What role do lot .pdfagarwalbeautyshop121
 
art 1 Starting from the unorderedLinkedList.h (attached with this as.pdf
 art 1 Starting from the unorderedLinkedList.h (attached with this as.pdf art 1 Starting from the unorderedLinkedList.h (attached with this as.pdf
art 1 Starting from the unorderedLinkedList.h (attached with this as.pdfagarwalbeautyshop121
 
As listed in Corporate Governance A Primer, the four main principles.pdf
 As listed in Corporate Governance A Primer, the four main principles.pdf As listed in Corporate Governance A Primer, the four main principles.pdf
As listed in Corporate Governance A Primer, the four main principles.pdfagarwalbeautyshop121
 
Art-labeling Activity The Vagina (Gross Anatomy)Art-labeling Acti.pdf
 Art-labeling Activity The Vagina (Gross Anatomy)Art-labeling Acti.pdf Art-labeling Activity The Vagina (Gross Anatomy)Art-labeling Acti.pdf
Art-labeling Activity The Vagina (Gross Anatomy)Art-labeling Acti.pdfagarwalbeautyshop121
 
Apple Inc. is a manufacturing company with the information below. Sup.pdf
 Apple Inc. is a manufacturing company with the information below. Sup.pdf Apple Inc. is a manufacturing company with the information below. Sup.pdf
Apple Inc. is a manufacturing company with the information below. Sup.pdfagarwalbeautyshop121
 
An FIl that invests $100 milion into corporate bonds is exposed to th.pdf
 An FIl that invests $100 milion into corporate bonds is exposed to th.pdf An FIl that invests $100 milion into corporate bonds is exposed to th.pdf
An FIl that invests $100 milion into corporate bonds is exposed to th.pdfagarwalbeautyshop121
 
and 18. CPR supports 19. CPR involves parts a. Chest b. c. d. thro.pdf
 and 18. CPR supports 19. CPR involves parts a. Chest b. c. d. thro.pdf and 18. CPR supports 19. CPR involves parts a. Chest b. c. d. thro.pdf
and 18. CPR supports 19. CPR involves parts a. Chest b. c. d. thro.pdfagarwalbeautyshop121
 
An investment had a nominal retum of 10.4 percent last yeat. The infl.pdf
 An investment had a nominal retum of 10.4 percent last yeat. The infl.pdf An investment had a nominal retum of 10.4 percent last yeat. The infl.pdf
An investment had a nominal retum of 10.4 percent last yeat. The infl.pdfagarwalbeautyshop121
 

More from agarwalbeautyshop121 (20)

Bank Reconciliation July 31,2022 Cash balance perbank statement $ A.pdf
 Bank Reconciliation July 31,2022 Cash balance perbank statement  $ A.pdf Bank Reconciliation July 31,2022 Cash balance perbank statement  $ A.pdf
Bank Reconciliation July 31,2022 Cash balance perbank statement $ A.pdf
 
Bajo las NIIF, �el marco coceptual a. Hace hincapi� en el co.pdf
 Bajo las NIIF, �el marco coceptual a. Hace hincapi� en el co.pdf Bajo las NIIF, �el marco coceptual a. Hace hincapi� en el co.pdf
Bajo las NIIF, �el marco coceptual a. Hace hincapi� en el co.pdf
 
Bacterial endospores form when the environment is no longer conducive.pdf
 Bacterial endospores form when the environment is no longer conducive.pdf Bacterial endospores form when the environment is no longer conducive.pdf
Bacterial endospores form when the environment is no longer conducive.pdf
 
B. Investigating different scenarios Waterbuck are a large antelope f.pdf
 B. Investigating different scenarios Waterbuck are a large antelope f.pdf B. Investigating different scenarios Waterbuck are a large antelope f.pdf
B. Investigating different scenarios Waterbuck are a large antelope f.pdf
 
b) Suppose host A sends some data to host D. What is the frame conten.pdf
 b) Suppose host A sends some data to host D. What is the frame conten.pdf b) Suppose host A sends some data to host D. What is the frame conten.pdf
b) Suppose host A sends some data to host D. What is the frame conten.pdf
 
At the peak of the action potential, the cell is permeable to Na+than.pdf
 At the peak of the action potential, the cell is permeable to Na+than.pdf At the peak of the action potential, the cell is permeable to Na+than.pdf
At the peak of the action potential, the cell is permeable to Na+than.pdf
 
At the end of 2019, Sentry Company reported a deferred tax liability .pdf
 At the end of 2019, Sentry Company reported a deferred tax liability .pdf At the end of 2019, Sentry Company reported a deferred tax liability .pdf
At the end of 2019, Sentry Company reported a deferred tax liability .pdf
 
At one point, certain U.S. Treasury bonds were callable. Consider the.pdf
 At one point, certain U.S. Treasury bonds were callable. Consider the.pdf At one point, certain U.S. Treasury bonds were callable. Consider the.pdf
At one point, certain U.S. Treasury bonds were callable. Consider the.pdf
 
At the beginning of its first year of operations, Buffalo Limited has.pdf
 At the beginning of its first year of operations, Buffalo Limited has.pdf At the beginning of its first year of operations, Buffalo Limited has.pdf
At the beginning of its first year of operations, Buffalo Limited has.pdf
 
At 0C to 4C (refrigeration temperature) the growth of most human path.pdf
 At 0C to 4C (refrigeration temperature) the growth of most human path.pdf At 0C to 4C (refrigeration temperature) the growth of most human path.pdf
At 0C to 4C (refrigeration temperature) the growth of most human path.pdf
 
Assume the values of integer variable sum is associated with the re.pdf
 Assume the values of integer variable sum is associated with the re.pdf Assume the values of integer variable sum is associated with the re.pdf
Assume the values of integer variable sum is associated with the re.pdf
 
Assume that the population proportion is 0.55 . Compute the standard .pdf
 Assume that the population proportion is 0.55 . Compute the standard .pdf Assume that the population proportion is 0.55 . Compute the standard .pdf
Assume that the population proportion is 0.55 . Compute the standard .pdf
 
ASE 1. Why is Maersks business model complex 2. What role do lot .pdf
 ASE 1. Why is Maersks business model complex 2. What role do lot .pdf ASE 1. Why is Maersks business model complex 2. What role do lot .pdf
ASE 1. Why is Maersks business model complex 2. What role do lot .pdf
 
art 1 Starting from the unorderedLinkedList.h (attached with this as.pdf
 art 1 Starting from the unorderedLinkedList.h (attached with this as.pdf art 1 Starting from the unorderedLinkedList.h (attached with this as.pdf
art 1 Starting from the unorderedLinkedList.h (attached with this as.pdf
 
As listed in Corporate Governance A Primer, the four main principles.pdf
 As listed in Corporate Governance A Primer, the four main principles.pdf As listed in Corporate Governance A Primer, the four main principles.pdf
As listed in Corporate Governance A Primer, the four main principles.pdf
 
Art-labeling Activity The Vagina (Gross Anatomy)Art-labeling Acti.pdf
 Art-labeling Activity The Vagina (Gross Anatomy)Art-labeling Acti.pdf Art-labeling Activity The Vagina (Gross Anatomy)Art-labeling Acti.pdf
Art-labeling Activity The Vagina (Gross Anatomy)Art-labeling Acti.pdf
 
Apple Inc. is a manufacturing company with the information below. Sup.pdf
 Apple Inc. is a manufacturing company with the information below. Sup.pdf Apple Inc. is a manufacturing company with the information below. Sup.pdf
Apple Inc. is a manufacturing company with the information below. Sup.pdf
 
An FIl that invests $100 milion into corporate bonds is exposed to th.pdf
 An FIl that invests $100 milion into corporate bonds is exposed to th.pdf An FIl that invests $100 milion into corporate bonds is exposed to th.pdf
An FIl that invests $100 milion into corporate bonds is exposed to th.pdf
 
and 18. CPR supports 19. CPR involves parts a. Chest b. c. d. thro.pdf
 and 18. CPR supports 19. CPR involves parts a. Chest b. c. d. thro.pdf and 18. CPR supports 19. CPR involves parts a. Chest b. c. d. thro.pdf
and 18. CPR supports 19. CPR involves parts a. Chest b. c. d. thro.pdf
 
An investment had a nominal retum of 10.4 percent last yeat. The infl.pdf
 An investment had a nominal retum of 10.4 percent last yeat. The infl.pdf An investment had a nominal retum of 10.4 percent last yeat. The infl.pdf
An investment had a nominal retum of 10.4 percent last yeat. The infl.pdf
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

B) Using the data element information above. Search the various total.pdf

  • 1. B) Using the data element information above. Search the various total to check and see if any of the elements listed above classifies as an IOC. (Find 3 malicious file hashes and 3 malicious IPs). - What security vendors marked the data element as malicious? (Take screenshots) - Click on the community tab, to check and see if the community agrees that the data element is indeed malicious. (Take screenshots) C) Cisco Talos is a web reputation center. Most companies will have their security tools pull on the web reputation reading given by Cisco Talos. If an unfavorable score has been presented to the web entities in question, firewalls and proxy servers will block those sites. Common Questions What are the Wob Reputation Threat Levcla? then D) Try finding three untrusted IPs from the data elements listed above (IPs only, as cisco Talos only deals with IPs/domain names/e-mail addresses/ and online data elements) using the cisco talso search. Cisco talos search URL. Also try searching things like RBC.com TDbank.com CNN.com google.com etc.. (take a screenshot of the reputation score).