SlideShare a Scribd company logo
Assignment 1 – Security In Computing & IT(COSC 2538)
Question 1

Criticality Level of the Application

Vulnerability - Mozilla Firefox 4.x through 5 does not properly implement JavaScript
The critical level is high of the application because its prone to provide the useful information to the
outsiders especially attackers or hackers. Furthermore, the specialized access is not required, thus
the attacking would be possible from anonymous and untrusted organizations.

Impact including CVSS Score (10.0)

According to the Base Score Metrics, the results for Exploitability shows that the application has
the chance of being attacked or for the thread from attacker or hacker. For example, the access
vector for this application is network, that means person who are not in the organisation related to
this application may corrupt the memory or get the application to crash. Attackers may attack from
anywhere without using local access too. The access complexity also results low for this application
may cause the attack from anonymous and the configuration also ubiquitous. The authentication is
not required for this application. Moreover, seeing the condition of Impact Metrics as
confidentiality, Integrity, and Availability also, its not secured application by having complete
result for mentioned options increased the vulnerability score.

Purpose of CVSS Score

Each group(Base, Environmental, Temporal) produces a numeric score ranging from 0 to 10, and a
Vector, a compressed textual representation that reflects the values used to derive the score. The
purpose of the CVSS base group is to define and communicate the fundamental characteristics of a
vulnerability. This objective approach to characterizing vulnerabilities provides users with a clear
and intuitive representation of a vulnerability.

Proposed Solution
   − Block external access at the network boundary.
   − The authentication is required for this application to reduce the number of attacks at one
     time.

Australian DSD '35 Strategies

Minimise the number of users with domain or local administrative privileges, and Application
whitelisting to help prevent malicious software and other unapproved programs from runningThis
can prevent unauthorized or anonymous to have control on the application to get the memory
corrupt and any malware software from attackers.
Network segmentation and segregation into security zones to protect sensitive information and
critical services such as user authentication and user directory information in the trem of
confidentiality and integrity impact of application. Attckers can read all the information and data
and may modify it, this will prevent those actions.
Centralised and time-synchronised logging of allowed and blocked network activity, with regular
log analysis, storing logs for at least 18 months. This will identify the anonymous and untrusted
people who are using the application illegally. The application required unspecialized access that
enables access to a wide range of systems and users.
                                                    1
Question 2
I had selected four top anti-virus companies that are McAfee, Avira, Symantec, Trend Micro. These
sites offer virus listings till the latest but the information is differ from one another. The most up-to-
date company is McAfee, because there are numbers of threat types on a day unlike other sites.
Symantec also deliver the listings about threats with discovered and updated equipped with time,
but it lacks of the information of the up-to-date threat listings compared to McAfee. Avira and
Trend Micro seems like providing similar data but they do not provide updated virus listings as
McAfee. The similarity of all sites are they are giving summary, characteristics of the threat, and
removal instructions.However, Symantec only provide threat summary included time but other
companies does not provide the detail about time of the threat,thus we cannot compare the time
difference. Moreover, McAfee also had tracked Top Virus Listing and Regioanl Virus Tracker that
can track viruses which could attack in 24 hours, and so on according continents.




                                                    2
Question 3

Criticality Level of the Software

Vulnerability - Microsoft Windows DNS Server NAPTR Query Remote Heap Memory Corruption.
An attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges.
Successful exploits will result in the complete compromise of affected computers, hence the
severity is high too.

Impact including CVSS Score (10.0)

According to the Base Score Metrics, the results for Exploitability shows that the application has
the chance of being attacked or for the thread from hacker. For example, the access vector for this
application is network, that means outsider or people who are not in the organisation related to this
application may corrupt the memory or get the software to crash. Attackers may attack from
anywhere without using local access too. The access complexity also results low for this application
may cause the attack from anonymous and the configuration also ubiquitous. The authentication is
not required for this software. Moreover, seeing the condition of Impact Metrics as confidentiality,
Integrity, and Availability, its not secured application by having complete result. Furthermore, the
attacker can have control over the files by having chance to read all the system's data, and able to
modify the data or files in order to corrupt the memory or system.In the term of availability, there
will be a total shutdown of the resource may be done by possible attacker.

Purpose of CVSS Score

Each group(Base, Environmental, Temporal) produces a numeric score ranging from 0 to 10, and a
Vector, a compressed textual representation that reflects the values used to derive the score. The
purpose of the CVSS base group is to define and communicate the fundamental characteristics of a
vulnerability. This objective approach to characterizing vulnerabilities provides users with a clear
and intuitive representation of a vulnerability.

Proposed Solution
   − Block external access at the network boundary, unless external parties require service.
   − Deploy network intrusion detection systems to monitor network traffic for malicious
      activity.

Australian DSD '35 Strategies

Minimise the number of users with domain or local administrative privileges, and Application
whitelisting to help prevent malicious software and other unapproved programs from running.This
can prevent unauthorized or anonymous to have control on the application to get the memory
corrupt and any malware software from attackers.
Network segmentation and segregation into security zones to protect sensitive information and
critical services such as user authentication and user directory information in the trem of
confidentiality and integrity impact of application. Attckers can read all the information and data
and may modify it, this will prevent those actions.
Centralised and time-synchronised logging of allowed and blocked network activity, with regular
log analysis, storing logs for at least 18 months. This will identify the anonymous and untrusted
people who are using the application illegally. The application required unspecialized access that
enables access to a wide range of systems and users.
                                                    3
Security in Computing and IT

More Related Content

What's hot

Software Security Testing
Software Security TestingSoftware Security Testing
Software Security Testingsrivinayak
 
Viewfinity Application Control and Monitoring 2015
Viewfinity Application Control and Monitoring 2015Viewfinity Application Control and Monitoring 2015
Viewfinity Application Control and Monitoring 2015Joseph Iannelli
 
Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities
Papitha Velumani
 
OTG - Practical Hands on VAPT
OTG - Practical Hands on VAPTOTG - Practical Hands on VAPT
OTG - Practical Hands on VAPT
shiriskumar
 
Analyzing and implementing of network penetration testing
Analyzing and implementing of network penetration testingAnalyzing and implementing of network penetration testing
Analyzing and implementing of network penetration testing
Engr Md Yusuf Miah
 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...
Alisha Henderson
 
Security communication
Security communicationSecurity communication
Security communicationSay Shyong
 
What is threat intelligence ?
What is threat intelligence ?What is threat intelligence ?
What is threat intelligence ?
AariyaRathi
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
phanleson
 
Demo how to detect ransomware with alien vault usm_gg
Demo  how to detect ransomware with alien vault usm_ggDemo  how to detect ransomware with alien vault usm_gg
Demo how to detect ransomware with alien vault usm_gg
AlienVault
 
Enemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling AccessEnemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling Access
BeyondTrust
 
A new web application vulnerability assessment framework
A new web application vulnerability assessment frameworkA new web application vulnerability assessment framework
A new web application vulnerability assessment framework
Mark Jayson Fuentes
 
Intro to Network Vapt
Intro to Network VaptIntro to Network Vapt
Intro to Network Vapt
Apurv Singh Gautam
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
Yvonne Marambanyika
 
Database security project-presentation-2-v1
Database security project-presentation-2-v1Database security project-presentation-2-v1
Database security project-presentation-2-v1
galibhussain
 
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged AccountsHow Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
BeyondTrust
 
Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques
Akash Karwande
 

What's hot (20)

Software Security Testing
Software Security TestingSoftware Security Testing
Software Security Testing
 
Viewfinity Application Control and Monitoring 2015
Viewfinity Application Control and Monitoring 2015Viewfinity Application Control and Monitoring 2015
Viewfinity Application Control and Monitoring 2015
 
Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities Analysis of field data on web security vulnerabilities
Analysis of field data on web security vulnerabilities
 
OTG - Practical Hands on VAPT
OTG - Practical Hands on VAPTOTG - Practical Hands on VAPT
OTG - Practical Hands on VAPT
 
Analyzing and implementing of network penetration testing
Analyzing and implementing of network penetration testingAnalyzing and implementing of network penetration testing
Analyzing and implementing of network penetration testing
 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...
 
Security communication
Security communicationSecurity communication
Security communication
 
What is threat intelligence ?
What is threat intelligence ?What is threat intelligence ?
What is threat intelligence ?
 
Ch20
Ch20Ch20
Ch20
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
 
Demo how to detect ransomware with alien vault usm_gg
Demo  how to detect ransomware with alien vault usm_ggDemo  how to detect ransomware with alien vault usm_gg
Demo how to detect ransomware with alien vault usm_gg
 
Enemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling AccessEnemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling Access
 
A new web application vulnerability assessment framework
A new web application vulnerability assessment frameworkA new web application vulnerability assessment framework
A new web application vulnerability assessment framework
 
Intro to Network Vapt
Intro to Network VaptIntro to Network Vapt
Intro to Network Vapt
 
Ch18
Ch18Ch18
Ch18
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
 
Database security project-presentation-2-v1
Database security project-presentation-2-v1Database security project-presentation-2-v1
Database security project-presentation-2-v1
 
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged AccountsHow Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
 
Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques
 
Security Software
Security SoftwareSecurity Software
Security Software
 

Viewers also liked

2011 Predictions (For Sun Signs based on Tarot)
2011 Predictions (For Sun Signs based on Tarot)2011 Predictions (For Sun Signs based on Tarot)
2011 Predictions (For Sun Signs based on Tarot)
Pankaj Thuain
 
Capco Linked In
Capco Linked InCapco Linked In
Capco Linked In
caldy008
 
Child care_and_bokashi
Child care_and_bokashiChild care_and_bokashi
Child care_and_bokashi
insertIDEAS
 
2012 ANNUAL HOROSCOPE
2012 ANNUAL HOROSCOPE 2012 ANNUAL HOROSCOPE
2012 ANNUAL HOROSCOPE
Pankaj Thuain
 
التخطيط وكتابة الاهداف
التخطيط وكتابة الاهدافالتخطيط وكتابة الاهداف
التخطيط وكتابة الاهدافguest6e7444
 
Cica10 05 Cap Uses
Cica10 05 Cap UsesCica10 05 Cap Uses
Cica10 05 Cap Uses
RiverKing
 
How to screw in a light bulb
How to screw in a light bulbHow to screw in a light bulb
How to screw in a light bulb
Dave Everett
 
Use Case Specifications
Use Case SpecificationsUse Case Specifications
Use Case SpecificationsKomalah Nair
 
Healthy Coffee Presentation English Pdf
Healthy Coffee Presentation English PdfHealthy Coffee Presentation English Pdf
Healthy Coffee Presentation English Pdfiuliana m
 
Data Communications and Net-Centric computing
Data Communications and Net-Centric computingData Communications and Net-Centric computing
Data Communications and Net-Centric computingKomalah Nair
 
Test Plan for online auction system
Test Plan for online auction systemTest Plan for online auction system
Test Plan for online auction systemKomalah Nair
 
IAS-7
IAS-7IAS-7
IAS-38 Intangible assets
IAS-38 Intangible assetsIAS-38 Intangible assets
IAS-38 Intangible assetsDHEERAJ AGRAWAL
 
Understanding FDA Regulations
Understanding  FDA RegulationsUnderstanding  FDA Regulations
Understanding FDA Regulations
Beth Friedland
 

Viewers also liked (16)

2011 Predictions (For Sun Signs based on Tarot)
2011 Predictions (For Sun Signs based on Tarot)2011 Predictions (For Sun Signs based on Tarot)
2011 Predictions (For Sun Signs based on Tarot)
 
Capco Linked In
Capco Linked InCapco Linked In
Capco Linked In
 
Child care_and_bokashi
Child care_and_bokashiChild care_and_bokashi
Child care_and_bokashi
 
2012 ANNUAL HOROSCOPE
2012 ANNUAL HOROSCOPE 2012 ANNUAL HOROSCOPE
2012 ANNUAL HOROSCOPE
 
Istanbul Rom
Istanbul RomIstanbul Rom
Istanbul Rom
 
التخطيط وكتابة الاهداف
التخطيط وكتابة الاهدافالتخطيط وكتابة الاهداف
التخطيط وكتابة الاهداف
 
Landall Photos
Landall PhotosLandall Photos
Landall Photos
 
Cica10 05 Cap Uses
Cica10 05 Cap UsesCica10 05 Cap Uses
Cica10 05 Cap Uses
 
How to screw in a light bulb
How to screw in a light bulbHow to screw in a light bulb
How to screw in a light bulb
 
Use Case Specifications
Use Case SpecificationsUse Case Specifications
Use Case Specifications
 
Healthy Coffee Presentation English Pdf
Healthy Coffee Presentation English PdfHealthy Coffee Presentation English Pdf
Healthy Coffee Presentation English Pdf
 
Data Communications and Net-Centric computing
Data Communications and Net-Centric computingData Communications and Net-Centric computing
Data Communications and Net-Centric computing
 
Test Plan for online auction system
Test Plan for online auction systemTest Plan for online auction system
Test Plan for online auction system
 
IAS-7
IAS-7IAS-7
IAS-7
 
IAS-38 Intangible assets
IAS-38 Intangible assetsIAS-38 Intangible assets
IAS-38 Intangible assets
 
Understanding FDA Regulations
Understanding  FDA RegulationsUnderstanding  FDA Regulations
Understanding FDA Regulations
 

Similar to Security in Computing and IT

Application security
Application securityApplication security
Application security
Hagar Alaa el-din
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
IJNSA Journal
 
Application security testing an integrated approach
Application security testing   an integrated approachApplication security testing   an integrated approach
Application security testing an integrated approach
Idexcel Technologies
 
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Mohammed Abdul Lateef
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
ahmed53254
 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdf
AmeliaJonas2
 
ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guideMatt Ford
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
21CT Inc.
 
Globally.docx
Globally.docxGlobally.docx
Globally.docx
GermanERuizCorrales
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
CMR WORLD TECH
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
Erfan Mallick
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
dadkhah077
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
MohamedOmerMusa
 
CyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxCyberSecurity Assignment.pptx
CyberSecurity Assignment.pptx
VinayPratap58
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat ManagementLokesh Sharma
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
sheikhparvez4
 
Cyber security & network attack6
Cyber security & network attack6Cyber security & network attack6
Cyber security & network attack6
HCL Technologies
 

Similar to Security in Computing and IT (20)

Research Paper
Research PaperResearch Paper
Research Paper
 
Application security
Application securityApplication security
Application security
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
 
Application security testing an integrated approach
Application security testing   an integrated approachApplication security testing   an integrated approach
Application security testing an integrated approach
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdf
 
ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guide
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
 
Globally.docx
Globally.docxGlobally.docx
Globally.docx
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
 
CyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxCyberSecurity Assignment.pptx
CyberSecurity Assignment.pptx
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
Cyber security & network attack6
Cyber security & network attack6Cyber security & network attack6
Cyber security & network attack6
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 

Security in Computing and IT

  • 1. Assignment 1 – Security In Computing & IT(COSC 2538) Question 1 Criticality Level of the Application Vulnerability - Mozilla Firefox 4.x through 5 does not properly implement JavaScript The critical level is high of the application because its prone to provide the useful information to the outsiders especially attackers or hackers. Furthermore, the specialized access is not required, thus the attacking would be possible from anonymous and untrusted organizations. Impact including CVSS Score (10.0) According to the Base Score Metrics, the results for Exploitability shows that the application has the chance of being attacked or for the thread from attacker or hacker. For example, the access vector for this application is network, that means person who are not in the organisation related to this application may corrupt the memory or get the application to crash. Attackers may attack from anywhere without using local access too. The access complexity also results low for this application may cause the attack from anonymous and the configuration also ubiquitous. The authentication is not required for this application. Moreover, seeing the condition of Impact Metrics as confidentiality, Integrity, and Availability also, its not secured application by having complete result for mentioned options increased the vulnerability score. Purpose of CVSS Score Each group(Base, Environmental, Temporal) produces a numeric score ranging from 0 to 10, and a Vector, a compressed textual representation that reflects the values used to derive the score. The purpose of the CVSS base group is to define and communicate the fundamental characteristics of a vulnerability. This objective approach to characterizing vulnerabilities provides users with a clear and intuitive representation of a vulnerability. Proposed Solution − Block external access at the network boundary. − The authentication is required for this application to reduce the number of attacks at one time. Australian DSD '35 Strategies Minimise the number of users with domain or local administrative privileges, and Application whitelisting to help prevent malicious software and other unapproved programs from runningThis can prevent unauthorized or anonymous to have control on the application to get the memory corrupt and any malware software from attackers. Network segmentation and segregation into security zones to protect sensitive information and critical services such as user authentication and user directory information in the trem of confidentiality and integrity impact of application. Attckers can read all the information and data and may modify it, this will prevent those actions. Centralised and time-synchronised logging of allowed and blocked network activity, with regular log analysis, storing logs for at least 18 months. This will identify the anonymous and untrusted people who are using the application illegally. The application required unspecialized access that enables access to a wide range of systems and users. 1
  • 2. Question 2 I had selected four top anti-virus companies that are McAfee, Avira, Symantec, Trend Micro. These sites offer virus listings till the latest but the information is differ from one another. The most up-to- date company is McAfee, because there are numbers of threat types on a day unlike other sites. Symantec also deliver the listings about threats with discovered and updated equipped with time, but it lacks of the information of the up-to-date threat listings compared to McAfee. Avira and Trend Micro seems like providing similar data but they do not provide updated virus listings as McAfee. The similarity of all sites are they are giving summary, characteristics of the threat, and removal instructions.However, Symantec only provide threat summary included time but other companies does not provide the detail about time of the threat,thus we cannot compare the time difference. Moreover, McAfee also had tracked Top Virus Listing and Regioanl Virus Tracker that can track viruses which could attack in 24 hours, and so on according continents. 2
  • 3. Question 3 Criticality Level of the Software Vulnerability - Microsoft Windows DNS Server NAPTR Query Remote Heap Memory Corruption. An attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successful exploits will result in the complete compromise of affected computers, hence the severity is high too. Impact including CVSS Score (10.0) According to the Base Score Metrics, the results for Exploitability shows that the application has the chance of being attacked or for the thread from hacker. For example, the access vector for this application is network, that means outsider or people who are not in the organisation related to this application may corrupt the memory or get the software to crash. Attackers may attack from anywhere without using local access too. The access complexity also results low for this application may cause the attack from anonymous and the configuration also ubiquitous. The authentication is not required for this software. Moreover, seeing the condition of Impact Metrics as confidentiality, Integrity, and Availability, its not secured application by having complete result. Furthermore, the attacker can have control over the files by having chance to read all the system's data, and able to modify the data or files in order to corrupt the memory or system.In the term of availability, there will be a total shutdown of the resource may be done by possible attacker. Purpose of CVSS Score Each group(Base, Environmental, Temporal) produces a numeric score ranging from 0 to 10, and a Vector, a compressed textual representation that reflects the values used to derive the score. The purpose of the CVSS base group is to define and communicate the fundamental characteristics of a vulnerability. This objective approach to characterizing vulnerabilities provides users with a clear and intuitive representation of a vulnerability. Proposed Solution − Block external access at the network boundary, unless external parties require service. − Deploy network intrusion detection systems to monitor network traffic for malicious activity. Australian DSD '35 Strategies Minimise the number of users with domain or local administrative privileges, and Application whitelisting to help prevent malicious software and other unapproved programs from running.This can prevent unauthorized or anonymous to have control on the application to get the memory corrupt and any malware software from attackers. Network segmentation and segregation into security zones to protect sensitive information and critical services such as user authentication and user directory information in the trem of confidentiality and integrity impact of application. Attckers can read all the information and data and may modify it, this will prevent those actions. Centralised and time-synchronised logging of allowed and blocked network activity, with regular log analysis, storing logs for at least 18 months. This will identify the anonymous and untrusted people who are using the application illegally. The application required unspecialized access that enables access to a wide range of systems and users. 3