SlideShare a Scribd company logo
Write the questions followed by your answers.
1.
Using the web and other resources research the Conficker
malware
and
Koobface malware.
Select one (1) of the pieces of
malware and write a complete overview
of each piece of malware. Describe what type of malware it is:
(e.g. virus, worm, DoS, blended, botnet, or various other types).
You need to
explicitly identify
and
provide a description
of the key attributes including: how the infection occurs, what
triggers it and what the payload is.
Note that there are typically several different infections,
payloads, triggers, defenses that need to be discussed. This is
true for many examples of malware and not just Conficker and
Koobface.
This information is readily available on the internet. Therefore
the value you will add is to provide your information so that
each of the attributes is clearly
identified, labeled and
described.
A cut and paste of information without adding value will not be
a good answer.
Present your finding using the template provided below.
This problem requires some detail.
NAME:
OVERVIEW: (General overview. Include in the overview what
platforms and or applications are affected. Also include any
other information that you consider important for an overview.)
TYPE:
INFECTION: (There can be numerous infections. Consider user
visible and internal infections.)
PAYLOAD:
(There can be numerous payloads. Consider user visible and
internal payloads.)
TRIGGER: (There can be numerous triggers. Consider user
caused and internal triggers.)
DEFENSE: (How can you defend against this malware?)
ADDITIONAL COMMENTS:
(15 points)
2.
Describe what a social engineering attack is.
[ your answer goes here ]
Provide 3 examples of social engineering attacks and describe
how they could be used to undermine the security of your IT
infrastructure.
[ your answer goes here ]
How can social engineering attacks be defended against?
[ your answer goes here ]
(15 points)
3.
Assume you have a computing environment consisting of a mix
of machines running three (3) Windows platforms with the
following operating systems; XP, Vista and Windows 7. There
are also machines running Linux and Apple iOS. Your
environment runs a mix of email and various office applications
(e.g. word processing, spreadsheet, slide presentation,
database). There is regular use of internet sites both for
business and some personal use. There are also laptops, mobile
phones and tablets that connect wirelessly to your network.
The environment is spread across a wide geographic area. While
it might be tempting to have a solution that uses one type of
system, such as Windows 7 this is not a possibility given the
problem statement. The heterogeneity of the platforms in the
environment is typical of the complexity faced by many
organizations today. The environment is as defined and you
must deal with the stated variation and complexity.
What do you consider to be the major risks to your environment
and why? Describe the risks and vulnerabilities involved in the
above
stated environment.
There are many risks to consider.
You must provide
a minimum of 10 risks with explanations.
Your explanations must provide some detail.
Place your risks and descriptions in a numbered list.
(40 points)
4.
Explain what spyware is?
[ Your answer goes here ]
Provide an example of a specific piece of spyware. Explain the
key attributes of it using the following template.
[ Your answer goes here ]
NAME:
OVERVIEW: (General overview. Include in the overview what
platforms and or applications are affected. Also include any
other information that you consider important for an overview.)
TYPE:
INFECTION: (There can be numerous infections. Consider user
visible and internal infections.)
PAYLOAD:
(There can be numerous payloads. Consider user visible and
internal payloads.)
TRIGGER: (There can be numerous triggers. Consider user
caused and internal triggers.)
DEFENSE: (How can you defend against this malware?)
ADDITIONAL COMMENTS:
(15 points)
5.
Provide a description of a malware attack that affected your
home or work assets. If you have never experienced a malware
attack find someone that has and conduct an interview with
them to answer the questions.
[ your answer goes here ]
Identify the type of malware it is and the attributes of the
attack.
[ your answer goes here ]
Describe the damage the malware caused and how the attack
was responded to.
[ your answer goes here ]
What could have been done to prevent this attack?Why weren’t
these steps taken initially?
[ your answer goes here ]
(15 points)
Please be sure to submit your answers as an attachment using
the assignment tool.

More Related Content

Similar to Write the questions followed by your answers.1.Using the web.docx

1 Introduction The task of identifying risks in an.docx
1 Introduction The task of identifying risks in an.docx1 Introduction The task of identifying risks in an.docx
1 Introduction The task of identifying risks in an.docx
oswald1horne84988
 
Answer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxAnswer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docx
spoonerneddy
 
Computer Software Attacks
Computer Software AttacksComputer Software Attacks
Computer Software Attacks
Susan Cox
 
Web virus activity
Web virus activityWeb virus activity
Web virus activitySim_Dhillon
 
Factors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent InvolvedFactors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent Involved
Jennifer Campbell
 
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docxRunning head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
todd521
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)
Yuval Sinay, CISSP, C|CISO
 
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
ESET Middle East
 
SEC 572 Inspiring Innovation / tutorialrank.com
SEC 572 Inspiring Innovation / tutorialrank.comSEC 572 Inspiring Innovation / tutorialrank.com
SEC 572 Inspiring Innovation / tutorialrank.com
Bromleyz38
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging Threats
Alan Kan
 
1.From the first e-Activity, explain the key differences between vir.docx
1.From the first e-Activity, explain the key differences between vir.docx1.From the first e-Activity, explain the key differences between vir.docx
1.From the first e-Activity, explain the key differences between vir.docx
ChereCoble417
 
Sec 572 Education Specialist-snaptutorial.com
Sec 572 Education Specialist-snaptutorial.comSec 572 Education Specialist-snaptutorial.com
Sec 572 Education Specialist-snaptutorial.com
robertlesew79
 
Sec 572 Education Organization / snaptutorial.com
Sec 572  Education Organization / snaptutorial.comSec 572  Education Organization / snaptutorial.com
Sec 572 Education Organization / snaptutorial.com
Baileya109
 
The unprecedented state of web insecurity
The unprecedented state of web insecurityThe unprecedented state of web insecurity
The unprecedented state of web insecurity
Vincent Kwon
 
Sec 572 Effective Communication - tutorialrank.com
Sec 572 Effective Communication - tutorialrank.comSec 572 Effective Communication - tutorialrank.com
Sec 572 Effective Communication - tutorialrank.com
Bartholomew99
 

Similar to Write the questions followed by your answers.1.Using the web.docx (16)

1 Introduction The task of identifying risks in an.docx
1 Introduction The task of identifying risks in an.docx1 Introduction The task of identifying risks in an.docx
1 Introduction The task of identifying risks in an.docx
 
Answer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxAnswer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docx
 
Computer Software Attacks
Computer Software AttacksComputer Software Attacks
Computer Software Attacks
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
Factors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent InvolvedFactors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent Involved
 
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docxRunning head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)
 
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
 
SEC 572 Inspiring Innovation / tutorialrank.com
SEC 572 Inspiring Innovation / tutorialrank.comSEC 572 Inspiring Innovation / tutorialrank.com
SEC 572 Inspiring Innovation / tutorialrank.com
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging Threats
 
1.From the first e-Activity, explain the key differences between vir.docx
1.From the first e-Activity, explain the key differences between vir.docx1.From the first e-Activity, explain the key differences between vir.docx
1.From the first e-Activity, explain the key differences between vir.docx
 
APT - Project
APT - Project APT - Project
APT - Project
 
Sec 572 Education Specialist-snaptutorial.com
Sec 572 Education Specialist-snaptutorial.comSec 572 Education Specialist-snaptutorial.com
Sec 572 Education Specialist-snaptutorial.com
 
Sec 572 Education Organization / snaptutorial.com
Sec 572  Education Organization / snaptutorial.comSec 572  Education Organization / snaptutorial.com
Sec 572 Education Organization / snaptutorial.com
 
The unprecedented state of web insecurity
The unprecedented state of web insecurityThe unprecedented state of web insecurity
The unprecedented state of web insecurity
 
Sec 572 Effective Communication - tutorialrank.com
Sec 572 Effective Communication - tutorialrank.comSec 572 Effective Communication - tutorialrank.com
Sec 572 Effective Communication - tutorialrank.com
 

More from rochellwa9f

Write your two editorials in the space provided at the end of the as.docx
Write your two editorials in the space provided at the end of the as.docxWrite your two editorials in the space provided at the end of the as.docx
Write your two editorials in the space provided at the end of the as.docx
rochellwa9f
 
Write two obituaries (minimum 250 words each) in remembrance of Pr.docx
Write two obituaries (minimum 250 words each) in remembrance of Pr.docxWrite two obituaries (minimum 250 words each) in remembrance of Pr.docx
Write two obituaries (minimum 250 words each) in remembrance of Pr.docx
rochellwa9f
 
Write two 350- to 700-word essays the first about one of the read.docx
Write two 350- to 700-word essays the first about one of the read.docxWrite two 350- to 700-word essays the first about one of the read.docx
Write two 350- to 700-word essays the first about one of the read.docx
rochellwa9f
 
Write several paragraphs expressing your point of view on the advant.docx
Write several paragraphs expressing your point of view on the advant.docxWrite several paragraphs expressing your point of view on the advant.docx
Write several paragraphs expressing your point of view on the advant.docx
rochellwa9f
 
Write two obituaries (minimum 250 words each) in remembrance of Pres.docx
Write two obituaries (minimum 250 words each) in remembrance of Pres.docxWrite two obituaries (minimum 250 words each) in remembrance of Pres.docx
Write two obituaries (minimum 250 words each) in remembrance of Pres.docx
rochellwa9f
 
Write two complete paragraphs. Each should start a topic sentence an.docx
Write two complete paragraphs. Each should start a topic sentence an.docxWrite two complete paragraphs. Each should start a topic sentence an.docx
Write two complete paragraphs. Each should start a topic sentence an.docx
rochellwa9f
 
Write one paragraph for each of the prompts.(200 words each)PROM.docx
Write one paragraph for each of the prompts.(200 words each)PROM.docxWrite one paragraph for each of the prompts.(200 words each)PROM.docx
Write one paragraph for each of the prompts.(200 words each)PROM.docx
rochellwa9f
 
Write one paragraph for each of the following topics (The assignment.docx
Write one paragraph for each of the following topics (The assignment.docxWrite one paragraph for each of the following topics (The assignment.docx
Write one paragraph for each of the following topics (The assignment.docx
rochellwa9f
 
Write several paragraphs ( 350 - 400 words) expreesing your point of.docx
Write several paragraphs ( 350 - 400 words) expreesing your point of.docxWrite several paragraphs ( 350 - 400 words) expreesing your point of.docx
Write several paragraphs ( 350 - 400 words) expreesing your point of.docx
rochellwa9f
 
write paragraphs on needs and wants of accient communities and how t.docx
write paragraphs on needs and wants of accient communities and how t.docxwrite paragraphs on needs and wants of accient communities and how t.docx
write paragraphs on needs and wants of accient communities and how t.docx
rochellwa9f
 
Write Presentthreedistinct informal logical fallacies you.docx
Write Presentthreedistinct informal logical fallacies you.docxWrite Presentthreedistinct informal logical fallacies you.docx
Write Presentthreedistinct informal logical fallacies you.docx
rochellwa9f
 
Write just one small paragraph only ( like your opinion, do you agre.docx
Write just one small paragraph only ( like your opinion, do you agre.docxWrite just one small paragraph only ( like your opinion, do you agre.docx
Write just one small paragraph only ( like your opinion, do you agre.docx
rochellwa9f
 
write one and half page word doc Critically think of a solutio.docx
write one and half page word doc Critically think of a solutio.docxwrite one and half page word doc Critically think of a solutio.docx
write one and half page word doc Critically think of a solutio.docx
rochellwa9f
 
Write many paragraphs aboutGovernments should regulate and moni.docx
Write many paragraphs aboutGovernments should regulate and moni.docxWrite many paragraphs aboutGovernments should regulate and moni.docx
Write many paragraphs aboutGovernments should regulate and moni.docx
rochellwa9f
 
write on your impressions of the film and how it documents a long go.docx
write on your impressions of the film and how it documents a long go.docxwrite on your impressions of the film and how it documents a long go.docx
write on your impressions of the film and how it documents a long go.docx
rochellwa9f
 
Write critiques of the following two short essays. About 3-4 sentenc.docx
Write critiques of the following two short essays. About 3-4 sentenc.docxWrite critiques of the following two short essays. About 3-4 sentenc.docx
Write critiques of the following two short essays. About 3-4 sentenc.docx
rochellwa9f
 
Write between 750 – 1,250 words (approximately 3 – 5 pages) using .docx
Write between 750 – 1,250 words (approximately 3 – 5 pages) using .docxWrite between 750 – 1,250 words (approximately 3 – 5 pages) using .docx
Write between 750 – 1,250 words (approximately 3 – 5 pages) using .docx
rochellwa9f
 
write half page long, APA format.1. define and describe busine.docx
write half page long, APA format.1. define and describe busine.docxwrite half page long, APA format.1. define and describe busine.docx
write half page long, APA format.1. define and describe busine.docx
rochellwa9f
 
Write at least 350 words in which you consider personality. In you.docx
Write at least 350 words in which you consider personality. In you.docxWrite at least 350 words in which you consider personality. In you.docx
Write at least 350 words in which you consider personality. In you.docx
rochellwa9f
 
Write four pages, double space, a paper analyzing the dual (double) .docx
Write four pages, double space, a paper analyzing the dual (double) .docxWrite four pages, double space, a paper analyzing the dual (double) .docx
Write four pages, double space, a paper analyzing the dual (double) .docx
rochellwa9f
 

More from rochellwa9f (20)

Write your two editorials in the space provided at the end of the as.docx
Write your two editorials in the space provided at the end of the as.docxWrite your two editorials in the space provided at the end of the as.docx
Write your two editorials in the space provided at the end of the as.docx
 
Write two obituaries (minimum 250 words each) in remembrance of Pr.docx
Write two obituaries (minimum 250 words each) in remembrance of Pr.docxWrite two obituaries (minimum 250 words each) in remembrance of Pr.docx
Write two obituaries (minimum 250 words each) in remembrance of Pr.docx
 
Write two 350- to 700-word essays the first about one of the read.docx
Write two 350- to 700-word essays the first about one of the read.docxWrite two 350- to 700-word essays the first about one of the read.docx
Write two 350- to 700-word essays the first about one of the read.docx
 
Write several paragraphs expressing your point of view on the advant.docx
Write several paragraphs expressing your point of view on the advant.docxWrite several paragraphs expressing your point of view on the advant.docx
Write several paragraphs expressing your point of view on the advant.docx
 
Write two obituaries (minimum 250 words each) in remembrance of Pres.docx
Write two obituaries (minimum 250 words each) in remembrance of Pres.docxWrite two obituaries (minimum 250 words each) in remembrance of Pres.docx
Write two obituaries (minimum 250 words each) in remembrance of Pres.docx
 
Write two complete paragraphs. Each should start a topic sentence an.docx
Write two complete paragraphs. Each should start a topic sentence an.docxWrite two complete paragraphs. Each should start a topic sentence an.docx
Write two complete paragraphs. Each should start a topic sentence an.docx
 
Write one paragraph for each of the prompts.(200 words each)PROM.docx
Write one paragraph for each of the prompts.(200 words each)PROM.docxWrite one paragraph for each of the prompts.(200 words each)PROM.docx
Write one paragraph for each of the prompts.(200 words each)PROM.docx
 
Write one paragraph for each of the following topics (The assignment.docx
Write one paragraph for each of the following topics (The assignment.docxWrite one paragraph for each of the following topics (The assignment.docx
Write one paragraph for each of the following topics (The assignment.docx
 
Write several paragraphs ( 350 - 400 words) expreesing your point of.docx
Write several paragraphs ( 350 - 400 words) expreesing your point of.docxWrite several paragraphs ( 350 - 400 words) expreesing your point of.docx
Write several paragraphs ( 350 - 400 words) expreesing your point of.docx
 
write paragraphs on needs and wants of accient communities and how t.docx
write paragraphs on needs and wants of accient communities and how t.docxwrite paragraphs on needs and wants of accient communities and how t.docx
write paragraphs on needs and wants of accient communities and how t.docx
 
Write Presentthreedistinct informal logical fallacies you.docx
Write Presentthreedistinct informal logical fallacies you.docxWrite Presentthreedistinct informal logical fallacies you.docx
Write Presentthreedistinct informal logical fallacies you.docx
 
Write just one small paragraph only ( like your opinion, do you agre.docx
Write just one small paragraph only ( like your opinion, do you agre.docxWrite just one small paragraph only ( like your opinion, do you agre.docx
Write just one small paragraph only ( like your opinion, do you agre.docx
 
write one and half page word doc Critically think of a solutio.docx
write one and half page word doc Critically think of a solutio.docxwrite one and half page word doc Critically think of a solutio.docx
write one and half page word doc Critically think of a solutio.docx
 
Write many paragraphs aboutGovernments should regulate and moni.docx
Write many paragraphs aboutGovernments should regulate and moni.docxWrite many paragraphs aboutGovernments should regulate and moni.docx
Write many paragraphs aboutGovernments should regulate and moni.docx
 
write on your impressions of the film and how it documents a long go.docx
write on your impressions of the film and how it documents a long go.docxwrite on your impressions of the film and how it documents a long go.docx
write on your impressions of the film and how it documents a long go.docx
 
Write critiques of the following two short essays. About 3-4 sentenc.docx
Write critiques of the following two short essays. About 3-4 sentenc.docxWrite critiques of the following two short essays. About 3-4 sentenc.docx
Write critiques of the following two short essays. About 3-4 sentenc.docx
 
Write between 750 – 1,250 words (approximately 3 – 5 pages) using .docx
Write between 750 – 1,250 words (approximately 3 – 5 pages) using .docxWrite between 750 – 1,250 words (approximately 3 – 5 pages) using .docx
Write between 750 – 1,250 words (approximately 3 – 5 pages) using .docx
 
write half page long, APA format.1. define and describe busine.docx
write half page long, APA format.1. define and describe busine.docxwrite half page long, APA format.1. define and describe busine.docx
write half page long, APA format.1. define and describe busine.docx
 
Write at least 350 words in which you consider personality. In you.docx
Write at least 350 words in which you consider personality. In you.docxWrite at least 350 words in which you consider personality. In you.docx
Write at least 350 words in which you consider personality. In you.docx
 
Write four pages, double space, a paper analyzing the dual (double) .docx
Write four pages, double space, a paper analyzing the dual (double) .docxWrite four pages, double space, a paper analyzing the dual (double) .docx
Write four pages, double space, a paper analyzing the dual (double) .docx
 

Recently uploaded

Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 

Recently uploaded (20)

Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 

Write the questions followed by your answers.1.Using the web.docx

  • 1. Write the questions followed by your answers. 1. Using the web and other resources research the Conficker malware and Koobface malware. Select one (1) of the pieces of malware and write a complete overview of each piece of malware. Describe what type of malware it is: (e.g. virus, worm, DoS, blended, botnet, or various other types). You need to explicitly identify and provide a description of the key attributes including: how the infection occurs, what triggers it and what the payload is. Note that there are typically several different infections, payloads, triggers, defenses that need to be discussed. This is true for many examples of malware and not just Conficker and Koobface. This information is readily available on the internet. Therefore the value you will add is to provide your information so that each of the attributes is clearly identified, labeled and described. A cut and paste of information without adding value will not be a good answer.
  • 2. Present your finding using the template provided below. This problem requires some detail. NAME: OVERVIEW: (General overview. Include in the overview what platforms and or applications are affected. Also include any other information that you consider important for an overview.) TYPE: INFECTION: (There can be numerous infections. Consider user visible and internal infections.) PAYLOAD: (There can be numerous payloads. Consider user visible and internal payloads.) TRIGGER: (There can be numerous triggers. Consider user caused and internal triggers.) DEFENSE: (How can you defend against this malware?) ADDITIONAL COMMENTS: (15 points) 2. Describe what a social engineering attack is. [ your answer goes here ]
  • 3. Provide 3 examples of social engineering attacks and describe how they could be used to undermine the security of your IT infrastructure. [ your answer goes here ] How can social engineering attacks be defended against? [ your answer goes here ] (15 points) 3. Assume you have a computing environment consisting of a mix of machines running three (3) Windows platforms with the following operating systems; XP, Vista and Windows 7. There are also machines running Linux and Apple iOS. Your environment runs a mix of email and various office applications (e.g. word processing, spreadsheet, slide presentation, database). There is regular use of internet sites both for business and some personal use. There are also laptops, mobile phones and tablets that connect wirelessly to your network. The environment is spread across a wide geographic area. While it might be tempting to have a solution that uses one type of system, such as Windows 7 this is not a possibility given the problem statement. The heterogeneity of the platforms in the environment is typical of the complexity faced by many organizations today. The environment is as defined and you must deal with the stated variation and complexity.
  • 4. What do you consider to be the major risks to your environment and why? Describe the risks and vulnerabilities involved in the above stated environment. There are many risks to consider. You must provide a minimum of 10 risks with explanations. Your explanations must provide some detail. Place your risks and descriptions in a numbered list. (40 points) 4. Explain what spyware is? [ Your answer goes here ] Provide an example of a specific piece of spyware. Explain the key attributes of it using the following template. [ Your answer goes here ] NAME: OVERVIEW: (General overview. Include in the overview what platforms and or applications are affected. Also include any other information that you consider important for an overview.) TYPE: INFECTION: (There can be numerous infections. Consider user
  • 5. visible and internal infections.) PAYLOAD: (There can be numerous payloads. Consider user visible and internal payloads.) TRIGGER: (There can be numerous triggers. Consider user caused and internal triggers.) DEFENSE: (How can you defend against this malware?) ADDITIONAL COMMENTS: (15 points) 5. Provide a description of a malware attack that affected your home or work assets. If you have never experienced a malware attack find someone that has and conduct an interview with them to answer the questions. [ your answer goes here ] Identify the type of malware it is and the attributes of the attack. [ your answer goes here ] Describe the damage the malware caused and how the attack was responded to. [ your answer goes here ]
  • 6. What could have been done to prevent this attack?Why weren’t these steps taken initially? [ your answer goes here ] (15 points) Please be sure to submit your answers as an attachment using the assignment tool.