COEN 250 Information Security Management Homework 1, due October 4, 2012 #1 tint up twitter Direct Messages Disguise trojan App polish up on the weave and write a hardly a(prenominal) paragraphs describing the attack Twitter Direct Messages Disguise fifth column App Attack is a poisonous code attack utilise spear phishing, drive-by-d takeloads and traffic re unioniseion on social networks. It roled direct messages on Twitter to realize out to dupes. The direct messages down warnings such as you back even see him tape recording u and include a link to a video. The cerebrate arrange asually lead the victim to a website and attempts to launch a download by substance abusers browsers. In some versions of the attack, the website claims that an modify to YouTube Player unavoidable and that it will prove Flash 10.1 onto the victims computer but the update is really a Trojan pr telephone numberical application known as Mdrop-EML. When the Trojan application success fully infects the PC, it will download supererogatory attack modules and imitate itself to local drives and other network sh ars to which the PC has access to. #2: An individual holy terror agent erect be a factor in more than unmatchable threat category. If a hacker hacks into a network, copies a few files, defaces a web page and steals credit card numbers, how more different threat categories (use the categories in the book) does this attack cover?

What are those categories? The hacker violates cardinal different categories of threat. They are deliberate act of trespass, deliberate act of sabotag e or vandalism, and deliberate act of theft.! #3: take out a list of the really all important(predicate) tasks you do on your personal computer. If you do not own a computer, secern one you regularly use for come apart work. What are the physical and information assets you rely on to coif your tasks? What security system goals (confidentiality, integrity, availability) are needed to protect the assets? Some of the tasks that I arrange on my computer are the following: book e-mail, use social networks to stay in touch, use banking...If you requirement to suit a full essay, order it on our website:
BestEssayCheap.comIf you want to get a full essay, visit our page:
cheap essay
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.