Cyber security - vulnerabilities, Computer Network Security

The world has to deal with newly released vulnerabilities on a daily basis.  These vulnerabilities eventually lead to active exploits of systems, and it is our job as cyber security professionals to stop that from happening.

I would like for each of you to research a different set of (5) vulnerabilities have been release since Jan 1, 2010 and report back on(I should see 4 separate answers/signatures for each of the 5 vulnerabilities you choose):

1) What systems, services are affected;

2) What attack vectors could be used to exploit the vulnerable systems;

3) What mitigation factors could be used to stop the attack of the vulnerability;

4) We are going to build IDS signatures using English terms and not technical terms.  I would like for each of you to explain how you would build an "IDS Signature" to help detect each of the (5) vulnerabilities.  Some basics of the IDS rules:

  • Source/Destination Ports
  • Source/Destination IP's
  • Source/Destination protocol
  • Unique detection string (network sensor)
  • Unique application behavior (Host sensor)
  • Location of sensor (Host or network)
  • Timed sensor
  • Multiple hits
  • Action (Alert, firewall block, log)
  • Exceptions
  • Take into consideration false positives and false negatives
Posted Date: 3/14/2013 3:12:28 AM | Location : United States







Related Discussions:- Cyber security - vulnerabilities, Assignment Help, Ask Question on Cyber security - vulnerabilities, Get Answer, Expert's Help, Cyber security - vulnerabilities Discussions

Write discussion on Cyber security - vulnerabilities
Your posts are moderated
Related Questions
(a) Cost allocation mechanisms are important when it comes to establishing other aspects of inter-firm compensations and how these are transferred to the users. There are two pri

Problem (a) Name the various layers of the OSI model. (b) Show, by means of a diagram, how  the TCP/IP  reference model  is different from the OSI-7 reference model? Why is

Information and Network Security Part 1- Recovery of an encrypted `word' using a forward search attack. Complete and correct summary for part 1. Adequately commented, clea

FRAGMENTATION AND PATH MTU IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive d

People,Procedures,Data Asset Identification-Risk Management The human resources, data information and documentation assets are more difficult to identify. People having knowle

?Examples should include direct costs items, indirect costs items, as well as variable costing. ?What are at least 5 types of expenses that are associated with manufacturing the

Question a) From the capture below: Give the datagram source IP address, upper layer protocol, Total length in decimal and header checksum in hexadecimal; the segment source po

Netfilter Firewall Netfilter is the popular name for the packet filtering system installed by default in the Linux kernel. The filtering system can be used as a very effective

MegaCorp INC. is a large manufacturing firm that operates 5 factories in Dallas, 4  factories in Los Angeles, and 5 factories in Albany, New York.  It operates a tightly  connected

Is standard TCP effective in mobile wireless networks that operate with the IEEE 802.11 wireless local area network protocol?Discuss the issue