Software vulnerabilities, Computer Network Security

1.  We used the National Vulnerability Database. Select a recent vulnerability from that Database and analyse it from the following aspects:

  • Criticality level
  • Impact including CVSS Score. Additionally, explain the purpose of using CVSS scores.
  • Proposed Solution
  • Which of the Australian DSD '35 Strategies can be applied to mitigate the vulnerability.

Include valid explanations for your answer.

Ensure that you also provide a detailed description of the vulnerability.

2. Search a number of antivirus companies' (e.g. Symantec, McAfee, Kaspersky, F-Secure, AVG,  BitDefender, Webroot, ESET, G-Data, Avira) websites. Find at least four sites that offer malware listings, and compare the latest malware lists. Discuss how descriptive they are, which site is the most informative and up-to-date, what is the time difference between the sites' lists? 

3.  Select a recent vulnerability from an antivirus company's database, and analyse it from the same aspects as in question 1.  

4.  Select three recent, different threats from an antivirus company's database. Describe for each

(i) how it spreads (attack strategy)

(ii) The target of malicious activity (information, resource etc)

(iii) The way of hiding inside the victim's computer.  

To support your arguments

  • provide screen-dumps for each question (maximum four screen dumps per question; each screen dump must be large enough to read the text)
  • provide references (URLs) when you use information from different sources.
Posted Date: 2/26/2013 2:10:44 AM | Location : United States







Related Discussions:- Software vulnerabilities, Assignment Help, Ask Question on Software vulnerabilities, Get Answer, Expert's Help, Software vulnerabilities Discussions

Write discussion on Software vulnerabilities
Your posts are moderated
Related Questions
GROWTH OF LAN TECHNOLOGY The production of shared communication channels (LANs) started in 1960s and early 1970. The basic idea behind was to reduce the number of connectio

This project involves the design and development of a simulation environment of many sensors tagging material/ machinery/equipment/etc in a warehouse site to help monitor and manag

Proof that the sender forwards the message. It also prohibits the author of the code from falsely denying that he forward the message. This is achieved by record using the exact ti

Problem 1: What does the SNMP access policy show? SNMP community diagram SNMP access policy Problem 2: Does there exist any formal functional specificat

A  half-duplex (HDX) system gives communication in both directions, but only one direction at a time. Hardly, once a party stats receiving a signal, it must need for the transmi

Question: (a) Describe how IPSec provides data source authentication. (b) Which protocol can be used to provide limited traffic analysis confidentiality? Why is it "limite

(a) (i) Bob has public RSA key (n = 77, e = 7). Show that Bob's private key is (d = 43). (ii) Alice wants to send the message m = 13 to Bob. She encrypts the message usi

FRAGMENTATION Fragmentation information is kept in different extension header.  Every fragment has base header and fragmentation header. Whole datagram including original hea

project on ensuring data securities on cloud computing

Question: (a) A string of ciphertext was enciphered using an a±ne transformation of single letters in a 28-letter alphabet consisting of A to Z, a blank and a?, where A to Z ha