high on Essays logo

Our Services

Get 15% Discount on your First Order

Computer Science ISSC452 week 3 assignment

 

Instructions

In order to complete assignment #3 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #3). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:55 pm Eastern time on Sunday.

ATTACKS, EXPLOITS AND VULNERABILITIES

An attack is the act that takes advantage of a vulnerability to compromise an asset, thus resulting in a loss. It is accompanied by a threat-agent that denies, damages or steals an organization’s information or physical asset. A vulnerability is an identified weakness in a system, where controls are not present, or not effective or have become obsolete. Below you will find a list of attacks, threat agents and vulnerabilities. For this assignment you will need to pick five (5) of the below methods. Explain the method in detail and provide suggested prevention controls. For example, if malicious code were on the list below I would first explain the topic and then as suggested controls I would state: The obvious controls are good vulnerability management (e.g., installing patches on a regular basis), up-to-date antivirus, anti-spyware, etc., but there are also policy and awareness controls that guide users’ behavior (e.g., don’t click on links in email, etc). Please make sure that your answers are detailed and well supported. You must use a minimum of three outside sources. 

  1. Hoaxes with an attached virus
  2. Back doors
  3. Password attacks
  4. Denial-of-service (DoS) and distributed denial-of-service (DDos) attacks
  5. Spoofing
  6. Man-in-the-middle (MITM)
  7. Spam
  8. Sniffer
  9. Timing attack

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit
Reviews

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

do a cset diagram for Staples print department, Departments and Key Tasks: Print Services Department: In the diagram identify: ● major

do a cset diagram for Staples print department, Departments and Key Tasks: Print Services Department: In the diagram identify: ● major departments and their key tasks/activities/responsibilities ● major systems and databases ● threats/vulnerabilities/risks Tasks: Printing: Handling various types of printing including bulk, specialized, and quick print services. Copying: Providing self-service

  IT543-4: Design an implementation of cryptographic methods for an organization. Assignment Instructions: Perform the lab described in the zip

  IT543-4: Design an implementation of cryptographic methods for an organization. Assignment Instructions: Perform the lab described in the zip folder Wireshark — Capturing SSL Packets. Follow the directions, perform the indicated instructions, and provide the requested information. Take screenshots of each step to show that you are working through the steps.