Cyber security - vulnerabilities, Computer Network Security

The world has to deal with newly released vulnerabilities on a daily basis.  These vulnerabilities eventually lead to active exploits of systems, and it is our job as cyber security professionals to stop that from happening.

I would like for each of you to research a different set of (5) vulnerabilities have been release since Jan 1, 2010 and report back on(I should see 4 separate answers/signatures for each of the 5 vulnerabilities you choose):

1) What systems, services are affected;

2) What attack vectors could be used to exploit the vulnerable systems;

3) What mitigation factors could be used to stop the attack of the vulnerability;

4) We are going to build IDS signatures using English terms and not technical terms.  I would like for each of you to explain how you would build an "IDS Signature" to help detect each of the (5) vulnerabilities.  Some basics of the IDS rules:

  • Source/Destination Ports
  • Source/Destination IP's
  • Source/Destination protocol
  • Unique detection string (network sensor)
  • Unique application behavior (Host sensor)
  • Location of sensor (Host or network)
  • Timed sensor
  • Multiple hits
  • Action (Alert, firewall block, log)
  • Exceptions
  • Take into consideration false positives and false negatives
Posted Date: 3/14/2013 3:12:28 AM | Location : United States







Related Discussions:- Cyber security - vulnerabilities, Assignment Help, Ask Question on Cyber security - vulnerabilities, Get Answer, Expert's Help, Cyber security - vulnerabilities Discussions

Write discussion on Cyber security - vulnerabilities
Your posts are moderated
Related Questions
Question: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume the following: the signal level for the previous bit for NRZI was a 1

The best results obtained in the PIIT classes have been when the technique has been used in tutorial groups, rather than have students submit individual reflections on particular c

Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.

Data Classification and Management Corporate and military organizations use a several of classification schemes. Information owners are responsible for classifying information a

ADDRESS RESOLUTION WITH CLOSED-FORM COMPUTATION For networks use reliable addressing, it is possible to select an address that creates closed-form address resolution possible.

The Role of the Investigation The first phase, investigation is the most significant. What problem is the system being developed to solve? During investigation phase, objectives

Dynamic Packet Filtering Dynamic Packet Filtering is also referred to as stateful firewalling. Here the firewall maintains the status of connections as well. When a connection

Problem a) Give the destination IP address, upper layer protocol, TTL in decimal and header checksum in hexadecimal; the source port number and the destination port number in deci


POINT-TO-POINT: In Point-to-Point topology there are two kind of topologies. 1) STAR topology 2) TREE topology In star topology each and every computer is connect