SlideShare a Scribd company logo
1 of 6
Write the questions followed by your answers.
1.
Using the web and other resources research the Conficker
malware
and
Koobface malware.
Select one (1) of the pieces of
malware and write a complete overview
of each piece of malware. Describe what type of malware it is:
(e.g. virus, worm, DoS, blended, botnet, or various other types).
You need to
explicitly identify
and
provide a description
of the key attributes including: how the infection occurs, what
triggers it and what the payload is.
Note that there are typically several different infections,
payloads, triggers, defenses that need to be discussed. This is
true for many examples of malware and not just Conficker and
Koobface.
This information is readily available on the internet. Therefore
the value you will add is to provide your information so that
each of the attributes is clearly
identified, labeled and
described.
A cut and paste of information without adding value will not be
a good answer.
Present your finding using the template provided below.
This problem requires some detail.
NAME:
OVERVIEW: (General overview. Include in the overview what
platforms and or applications are affected. Also include any
other information that you consider important for an overview.)
TYPE:
INFECTION: (There can be numerous infections. Consider user
visible and internal infections.)
PAYLOAD:
(There can be numerous payloads. Consider user visible and
internal payloads.)
TRIGGER: (There can be numerous triggers. Consider user
caused and internal triggers.)
DEFENSE: (How can you defend against this malware?)
ADDITIONAL COMMENTS:
(15 points)
2.
Describe what a social engineering attack is.
[ your answer goes here ]
Provide 3 examples of social engineering attacks and describe
how they could be used to undermine the security of your IT
infrastructure.
[ your answer goes here ]
How can social engineering attacks be defended against?
[ your answer goes here ]
(15 points)
3.
Assume you have a computing environment consisting of a mix
of machines running three (3) Windows platforms with the
following operating systems; XP, Vista and Windows 7. There
are also machines running Linux and Apple iOS. Your
environment runs a mix of email and various office applications
(e.g. word processing, spreadsheet, slide presentation,
database). There is regular use of internet sites both for
business and some personal use. There are also laptops, mobile
phones and tablets that connect wirelessly to your network.
The environment is spread across a wide geographic area. While
it might be tempting to have a solution that uses one type of
system, such as Windows 7 this is not a possibility given the
problem statement. The heterogeneity of the platforms in the
environment is typical of the complexity faced by many
organizations today. The environment is as defined and you
must deal with the stated variation and complexity.
What do you consider to be the major risks to your environment
and why? Describe the risks and vulnerabilities involved in the
above
stated environment.
There are many risks to consider.
You must provide
a minimum of 10 risks with explanations.
Your explanations must provide some detail.
Place your risks and descriptions in a numbered list.
(40 points)
4.
Explain what spyware is?
[ Your answer goes here ]
Provide an example of a specific piece of spyware. Explain the
key attributes of it using the following template.
[ Your answer goes here ]
NAME:
OVERVIEW: (General overview. Include in the overview what
platforms and or applications are affected. Also include any
other information that you consider important for an overview.)
TYPE:
INFECTION: (There can be numerous infections. Consider user
visible and internal infections.)
PAYLOAD:
(There can be numerous payloads. Consider user visible and
internal payloads.)
TRIGGER: (There can be numerous triggers. Consider user
caused and internal triggers.)
DEFENSE: (How can you defend against this malware?)
ADDITIONAL COMMENTS:
(15 points)
5.
Provide a description of a malware attack that affected your
home or work assets. If you have never experienced a malware
attack find someone that has and conduct an interview with
them to answer the questions.
[ your answer goes here ]
Identify the type of malware it is and the attributes of the
attack.
[ your answer goes here ]
Describe the damage the malware caused and how the attack
was responded to.
[ your answer goes here ]
What could have been done to prevent this attack?Why weren’t
these steps taken initially?
[ your answer goes here ]
(15 points)
Please be sure to submit your answers as an attachment using
the assignment tool.

More Related Content

Similar to Write the questions followed by your answers.1.Using the web.docx

1 Introduction The task of identifying risks in an.docx
1 Introduction The task of identifying risks in an.docx1 Introduction The task of identifying risks in an.docx
1 Introduction The task of identifying risks in an.docx
oswald1horne84988
 
Answer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxAnswer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docx
spoonerneddy
 
Computer Software Attacks
Computer Software AttacksComputer Software Attacks
Computer Software Attacks
Susan Cox
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
Sim_Dhillon
 
Factors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent InvolvedFactors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent Involved
Jennifer Campbell
 
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docxRunning head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
todd521
 
1.From the first e-Activity, explain the key differences between vir.docx
1.From the first e-Activity, explain the key differences between vir.docx1.From the first e-Activity, explain the key differences between vir.docx
1.From the first e-Activity, explain the key differences between vir.docx
ChereCoble417
 

Similar to Write the questions followed by your answers.1.Using the web.docx (16)

1 Introduction The task of identifying risks in an.docx
1 Introduction The task of identifying risks in an.docx1 Introduction The task of identifying risks in an.docx
1 Introduction The task of identifying risks in an.docx
 
Answer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxAnswer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docx
 
Computer Software Attacks
Computer Software AttacksComputer Software Attacks
Computer Software Attacks
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
Factors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent InvolvedFactors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent Involved
 
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docxRunning head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)
 
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
 
SEC 572 Inspiring Innovation / tutorialrank.com
SEC 572 Inspiring Innovation / tutorialrank.comSEC 572 Inspiring Innovation / tutorialrank.com
SEC 572 Inspiring Innovation / tutorialrank.com
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging Threats
 
1.From the first e-Activity, explain the key differences between vir.docx
1.From the first e-Activity, explain the key differences between vir.docx1.From the first e-Activity, explain the key differences between vir.docx
1.From the first e-Activity, explain the key differences between vir.docx
 
APT - Project
APT - Project APT - Project
APT - Project
 
Sec 572 Education Specialist-snaptutorial.com
Sec 572 Education Specialist-snaptutorial.comSec 572 Education Specialist-snaptutorial.com
Sec 572 Education Specialist-snaptutorial.com
 
Sec 572 Education Organization / snaptutorial.com
Sec 572  Education Organization / snaptutorial.comSec 572  Education Organization / snaptutorial.com
Sec 572 Education Organization / snaptutorial.com
 
The unprecedented state of web insecurity
The unprecedented state of web insecurityThe unprecedented state of web insecurity
The unprecedented state of web insecurity
 
Sec 572 Effective Communication - tutorialrank.com
Sec 572 Effective Communication - tutorialrank.comSec 572 Effective Communication - tutorialrank.com
Sec 572 Effective Communication - tutorialrank.com
 

More from rochellwa9f

Write one paragraph for each of the prompts.(200 words each)PROM.docx
Write one paragraph for each of the prompts.(200 words each)PROM.docxWrite one paragraph for each of the prompts.(200 words each)PROM.docx
Write one paragraph for each of the prompts.(200 words each)PROM.docx
rochellwa9f
 
Write just one small paragraph only ( like your opinion, do you agre.docx
Write just one small paragraph only ( like your opinion, do you agre.docxWrite just one small paragraph only ( like your opinion, do you agre.docx
Write just one small paragraph only ( like your opinion, do you agre.docx
rochellwa9f
 
Write critiques of the following two short essays. About 3-4 sentenc.docx
Write critiques of the following two short essays. About 3-4 sentenc.docxWrite critiques of the following two short essays. About 3-4 sentenc.docx
Write critiques of the following two short essays. About 3-4 sentenc.docx
rochellwa9f
 

More from rochellwa9f (20)

Write your two editorials in the space provided at the end of the as.docx
Write your two editorials in the space provided at the end of the as.docxWrite your two editorials in the space provided at the end of the as.docx
Write your two editorials in the space provided at the end of the as.docx
 
Write two obituaries (minimum 250 words each) in remembrance of Pr.docx
Write two obituaries (minimum 250 words each) in remembrance of Pr.docxWrite two obituaries (minimum 250 words each) in remembrance of Pr.docx
Write two obituaries (minimum 250 words each) in remembrance of Pr.docx
 
Write two 350- to 700-word essays the first about one of the read.docx
Write two 350- to 700-word essays the first about one of the read.docxWrite two 350- to 700-word essays the first about one of the read.docx
Write two 350- to 700-word essays the first about one of the read.docx
 
Write several paragraphs expressing your point of view on the advant.docx
Write several paragraphs expressing your point of view on the advant.docxWrite several paragraphs expressing your point of view on the advant.docx
Write several paragraphs expressing your point of view on the advant.docx
 
Write two obituaries (minimum 250 words each) in remembrance of Pres.docx
Write two obituaries (minimum 250 words each) in remembrance of Pres.docxWrite two obituaries (minimum 250 words each) in remembrance of Pres.docx
Write two obituaries (minimum 250 words each) in remembrance of Pres.docx
 
Write two complete paragraphs. Each should start a topic sentence an.docx
Write two complete paragraphs. Each should start a topic sentence an.docxWrite two complete paragraphs. Each should start a topic sentence an.docx
Write two complete paragraphs. Each should start a topic sentence an.docx
 
Write one paragraph for each of the prompts.(200 words each)PROM.docx
Write one paragraph for each of the prompts.(200 words each)PROM.docxWrite one paragraph for each of the prompts.(200 words each)PROM.docx
Write one paragraph for each of the prompts.(200 words each)PROM.docx
 
Write one paragraph for each of the following topics (The assignment.docx
Write one paragraph for each of the following topics (The assignment.docxWrite one paragraph for each of the following topics (The assignment.docx
Write one paragraph for each of the following topics (The assignment.docx
 
Write several paragraphs ( 350 - 400 words) expreesing your point of.docx
Write several paragraphs ( 350 - 400 words) expreesing your point of.docxWrite several paragraphs ( 350 - 400 words) expreesing your point of.docx
Write several paragraphs ( 350 - 400 words) expreesing your point of.docx
 
write paragraphs on needs and wants of accient communities and how t.docx
write paragraphs on needs and wants of accient communities and how t.docxwrite paragraphs on needs and wants of accient communities and how t.docx
write paragraphs on needs and wants of accient communities and how t.docx
 
Write Presentthreedistinct informal logical fallacies you.docx
Write Presentthreedistinct informal logical fallacies you.docxWrite Presentthreedistinct informal logical fallacies you.docx
Write Presentthreedistinct informal logical fallacies you.docx
 
Write just one small paragraph only ( like your opinion, do you agre.docx
Write just one small paragraph only ( like your opinion, do you agre.docxWrite just one small paragraph only ( like your opinion, do you agre.docx
Write just one small paragraph only ( like your opinion, do you agre.docx
 
write one and half page word doc Critically think of a solutio.docx
write one and half page word doc Critically think of a solutio.docxwrite one and half page word doc Critically think of a solutio.docx
write one and half page word doc Critically think of a solutio.docx
 
Write many paragraphs aboutGovernments should regulate and moni.docx
Write many paragraphs aboutGovernments should regulate and moni.docxWrite many paragraphs aboutGovernments should regulate and moni.docx
Write many paragraphs aboutGovernments should regulate and moni.docx
 
write on your impressions of the film and how it documents a long go.docx
write on your impressions of the film and how it documents a long go.docxwrite on your impressions of the film and how it documents a long go.docx
write on your impressions of the film and how it documents a long go.docx
 
Write critiques of the following two short essays. About 3-4 sentenc.docx
Write critiques of the following two short essays. About 3-4 sentenc.docxWrite critiques of the following two short essays. About 3-4 sentenc.docx
Write critiques of the following two short essays. About 3-4 sentenc.docx
 
Write between 750 – 1,250 words (approximately 3 – 5 pages) using .docx
Write between 750 – 1,250 words (approximately 3 – 5 pages) using .docxWrite between 750 – 1,250 words (approximately 3 – 5 pages) using .docx
Write between 750 – 1,250 words (approximately 3 – 5 pages) using .docx
 
write half page long, APA format.1. define and describe busine.docx
write half page long, APA format.1. define and describe busine.docxwrite half page long, APA format.1. define and describe busine.docx
write half page long, APA format.1. define and describe busine.docx
 
Write at least 350 words in which you consider personality. In you.docx
Write at least 350 words in which you consider personality. In you.docxWrite at least 350 words in which you consider personality. In you.docx
Write at least 350 words in which you consider personality. In you.docx
 
Write four pages, double space, a paper analyzing the dual (double) .docx
Write four pages, double space, a paper analyzing the dual (double) .docxWrite four pages, double space, a paper analyzing the dual (double) .docx
Write four pages, double space, a paper analyzing the dual (double) .docx
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

Write the questions followed by your answers.1.Using the web.docx

  • 1. Write the questions followed by your answers. 1. Using the web and other resources research the Conficker malware and Koobface malware. Select one (1) of the pieces of malware and write a complete overview of each piece of malware. Describe what type of malware it is: (e.g. virus, worm, DoS, blended, botnet, or various other types). You need to explicitly identify and provide a description of the key attributes including: how the infection occurs, what triggers it and what the payload is. Note that there are typically several different infections, payloads, triggers, defenses that need to be discussed. This is true for many examples of malware and not just Conficker and Koobface. This information is readily available on the internet. Therefore the value you will add is to provide your information so that each of the attributes is clearly identified, labeled and described. A cut and paste of information without adding value will not be a good answer.
  • 2. Present your finding using the template provided below. This problem requires some detail. NAME: OVERVIEW: (General overview. Include in the overview what platforms and or applications are affected. Also include any other information that you consider important for an overview.) TYPE: INFECTION: (There can be numerous infections. Consider user visible and internal infections.) PAYLOAD: (There can be numerous payloads. Consider user visible and internal payloads.) TRIGGER: (There can be numerous triggers. Consider user caused and internal triggers.) DEFENSE: (How can you defend against this malware?) ADDITIONAL COMMENTS: (15 points) 2. Describe what a social engineering attack is. [ your answer goes here ]
  • 3. Provide 3 examples of social engineering attacks and describe how they could be used to undermine the security of your IT infrastructure. [ your answer goes here ] How can social engineering attacks be defended against? [ your answer goes here ] (15 points) 3. Assume you have a computing environment consisting of a mix of machines running three (3) Windows platforms with the following operating systems; XP, Vista and Windows 7. There are also machines running Linux and Apple iOS. Your environment runs a mix of email and various office applications (e.g. word processing, spreadsheet, slide presentation, database). There is regular use of internet sites both for business and some personal use. There are also laptops, mobile phones and tablets that connect wirelessly to your network. The environment is spread across a wide geographic area. While it might be tempting to have a solution that uses one type of system, such as Windows 7 this is not a possibility given the problem statement. The heterogeneity of the platforms in the environment is typical of the complexity faced by many organizations today. The environment is as defined and you must deal with the stated variation and complexity.
  • 4. What do you consider to be the major risks to your environment and why? Describe the risks and vulnerabilities involved in the above stated environment. There are many risks to consider. You must provide a minimum of 10 risks with explanations. Your explanations must provide some detail. Place your risks and descriptions in a numbered list. (40 points) 4. Explain what spyware is? [ Your answer goes here ] Provide an example of a specific piece of spyware. Explain the key attributes of it using the following template. [ Your answer goes here ] NAME: OVERVIEW: (General overview. Include in the overview what platforms and or applications are affected. Also include any other information that you consider important for an overview.) TYPE: INFECTION: (There can be numerous infections. Consider user
  • 5. visible and internal infections.) PAYLOAD: (There can be numerous payloads. Consider user visible and internal payloads.) TRIGGER: (There can be numerous triggers. Consider user caused and internal triggers.) DEFENSE: (How can you defend against this malware?) ADDITIONAL COMMENTS: (15 points) 5. Provide a description of a malware attack that affected your home or work assets. If you have never experienced a malware attack find someone that has and conduct an interview with them to answer the questions. [ your answer goes here ] Identify the type of malware it is and the attributes of the attack. [ your answer goes here ] Describe the damage the malware caused and how the attack was responded to. [ your answer goes here ]
  • 6. What could have been done to prevent this attack?Why weren’t these steps taken initially? [ your answer goes here ] (15 points) Please be sure to submit your answers as an attachment using the assignment tool.