Cyber security - vulnerabilities, Computer Network Security

The world has to deal with newly released vulnerabilities on a daily basis.  These vulnerabilities eventually lead to active exploits of systems, and it is our job as cyber security professionals to stop that from happening.

I would like for each of you to research a different set of (5) vulnerabilities have been release since Jan 1, 2010 and report back on(I should see 4 separate answers/signatures for each of the 5 vulnerabilities you choose):

1) What systems, services are affected;

2) What attack vectors could be used to exploit the vulnerable systems;

3) What mitigation factors could be used to stop the attack of the vulnerability;

4) We are going to build IDS signatures using English terms and not technical terms.  I would like for each of you to explain how you would build an "IDS Signature" to help detect each of the (5) vulnerabilities.  Some basics of the IDS rules:

  • Source/Destination Ports
  • Source/Destination IP's
  • Source/Destination protocol
  • Unique detection string (network sensor)
  • Unique application behavior (Host sensor)
  • Location of sensor (Host or network)
  • Timed sensor
  • Multiple hits
  • Action (Alert, firewall block, log)
  • Exceptions
  • Take into consideration false positives and false negatives
Posted Date: 3/14/2013 3:12:28 AM | Location : United States







Related Discussions:- Cyber security - vulnerabilities, Assignment Help, Ask Question on Cyber security - vulnerabilities, Get Answer, Expert's Help, Cyber security - vulnerabilities Discussions

Write discussion on Cyber security - vulnerabilities
Your posts are moderated
Related Questions
Question 1: (a) With the help of a diagram show the basic structure of a computer system. (b) Explain as fully as you can each of the parts mentioned above. (c) What are

Topic -Spam is an ever-growing problem, with some network administrators reporting that 90% or moreof the email delivered to their mail servers is spam. Identify and briefly evalua

Electronic Mail: Electronic mail which is famous as e-mail, as it is known to its number of users, has been around for more than two decades. Before 1990, it was mainly used in

Guided Media These are those that give a conduit from one machine to another that add twisted-pair, fiber-optic cable and coaxial cable. A signal traveling along any of these

Question: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume the following: the signal level for the previous bit for NRZI was a 1

Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page

Example : UCSF Medical Center In the year 2002, the University of California, San Francisco (UCSF) Medical Center received an email message from someone who claimed to be a doct


a. PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI

FIREWALL ANALYSIS TOOLS There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of u