Cyber security - vulnerabilities, Computer Network Security

The world has to deal with newly released vulnerabilities on a daily basis.  These vulnerabilities eventually lead to active exploits of systems, and it is our job as cyber security professionals to stop that from happening.

I would like for each of you to research a different set of (5) vulnerabilities have been release since Jan 1, 2010 and report back on(I should see 4 separate answers/signatures for each of the 5 vulnerabilities you choose):

1) What systems, services are affected;

2) What attack vectors could be used to exploit the vulnerable systems;

3) What mitigation factors could be used to stop the attack of the vulnerability;

4) We are going to build IDS signatures using English terms and not technical terms.  I would like for each of you to explain how you would build an "IDS Signature" to help detect each of the (5) vulnerabilities.  Some basics of the IDS rules:

  • Source/Destination Ports
  • Source/Destination IP's
  • Source/Destination protocol
  • Unique detection string (network sensor)
  • Unique application behavior (Host sensor)
  • Location of sensor (Host or network)
  • Timed sensor
  • Multiple hits
  • Action (Alert, firewall block, log)
  • Exceptions
  • Take into consideration false positives and false negatives
Posted Date: 3/14/2013 3:12:28 AM | Location : United States







Related Discussions:- Cyber security - vulnerabilities, Assignment Help, Ask Question on Cyber security - vulnerabilities, Get Answer, Expert's Help, Cyber security - vulnerabilities Discussions

Write discussion on Cyber security - vulnerabilities
Your posts are moderated
Related Questions
Improving domain blacklisting: Current domain blacklisting techniques are not very effective as spammers keep replacing blacklisted domains with newly registered domains. Also

Get a copy of Metasploitable at Make">http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ Make sure to follow these directions very carefully. You will get po

Using the selected approach, you should then conduct an audit or review of the information security issues associated with the use of computing facility and report on the findings.

Problem 1: List measurable entities on which the quality of service in a data communication network depends Problem 2: Show the features of a typical Network Management

Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

VULNERABILITY SCANNERS Active vulnerability scanners scan networks for detailed information, it initiate traffic to determine security holes. This scanner identifies usernames a

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption tec

Question: Quality management standards are seen as a major pillar supporting the drive for continuous quality improvement through TQM. (a) What do you meant by the term ‘Qua

Network Virtual Terminal It is a set of principles describing a very simple virtual terminal interaction. The NVT is needed in the start of a Telnet session. Communication wit

Question 1 Explain any two types of security policies Question 2 What is security attack? Explain with examples Question 3 Explain different characteristics that i