Software vulnerabilities, Computer Network Security

1.  We used the National Vulnerability Database. Select a recent vulnerability from that Database and analyse it from the following aspects:

  • Criticality level
  • Impact including CVSS Score. Additionally, explain the purpose of using CVSS scores.
  • Proposed Solution
  • Which of the Australian DSD '35 Strategies can be applied to mitigate the vulnerability.

Include valid explanations for your answer.

Ensure that you also provide a detailed description of the vulnerability.

2. Search a number of antivirus companies' (e.g. Symantec, McAfee, Kaspersky, F-Secure, AVG,  BitDefender, Webroot, ESET, G-Data, Avira) websites. Find at least four sites that offer malware listings, and compare the latest malware lists. Discuss how descriptive they are, which site is the most informative and up-to-date, what is the time difference between the sites' lists? 

3.  Select a recent vulnerability from an antivirus company's database, and analyse it from the same aspects as in question 1.  

4.  Select three recent, different threats from an antivirus company's database. Describe for each

(i) how it spreads (attack strategy)

(ii) The target of malicious activity (information, resource etc)

(iii) The way of hiding inside the victim's computer.  

To support your arguments

  • provide screen-dumps for each question (maximum four screen dumps per question; each screen dump must be large enough to read the text)
  • provide references (URLs) when you use information from different sources.
Posted Date: 2/26/2013 2:10:44 AM | Location : United States







Related Discussions:- Software vulnerabilities, Assignment Help, Ask Question on Software vulnerabilities, Get Answer, Expert's Help, Software vulnerabilities Discussions

Write discussion on Software vulnerabilities
Your posts are moderated
Related Questions
COLLISION: The receiver can get simultaneous requests, which gives in collision at receivers and both service lost and in this way no transmitter accepts reservations and both use

Question: (a) Explain briefly the PCI Control Objectives which enterprises must meet to be compliant with the Payment Card Industry Data Security Standard (PCI DSS). Specify a

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

Border Gateway Protocol It is a protocol needed to advertise the set of networks that can be achieved within an autonomous machine. BGP activates this information to be shared

Question (a) A CRC is constructed to generate a 4-bit FCS for an 11-bit message. The divisor polynomial is X 4 + X 3 + 1 (i) Encode the data bit sequence 00111011001 using po

B-Router Hybrid devices that has the features of both routers and bridges . A bridge router or brouter is a network machine that acts as a router and as a bridge. The brout

QUESTION : a) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem. You should pr

With explain the encryption model the help of diagram. Symmetric cipher model uses the secret-key or a single-key for encryption/decryption purposes. It employs a symmetric encr

(a) Briefly explain the following security goals provided by cryptography: confidentiality, authentication, integrity and non-repudiation. (b) State Kerckhoff's Princip

QUESTION (a) What do you meant by data spoliation? (b) Justify the following statement: "Disk imaging differs from creating a standard backup of disk." (c) Why do yo