Software vulnerabilities, Computer Network Security

1.  We used the National Vulnerability Database. Select a recent vulnerability from that Database and analyse it from the following aspects:

  • Criticality level
  • Impact including CVSS Score. Additionally, explain the purpose of using CVSS scores.
  • Proposed Solution
  • Which of the Australian DSD '35 Strategies can be applied to mitigate the vulnerability.

Include valid explanations for your answer.

Ensure that you also provide a detailed description of the vulnerability.

2. Search a number of antivirus companies' (e.g. Symantec, McAfee, Kaspersky, F-Secure, AVG,  BitDefender, Webroot, ESET, G-Data, Avira) websites. Find at least four sites that offer malware listings, and compare the latest malware lists. Discuss how descriptive they are, which site is the most informative and up-to-date, what is the time difference between the sites' lists? 

3.  Select a recent vulnerability from an antivirus company's database, and analyse it from the same aspects as in question 1.  

4.  Select three recent, different threats from an antivirus company's database. Describe for each

(i) how it spreads (attack strategy)

(ii) The target of malicious activity (information, resource etc)

(iii) The way of hiding inside the victim's computer.  

To support your arguments

  • provide screen-dumps for each question (maximum four screen dumps per question; each screen dump must be large enough to read the text)
  • provide references (URLs) when you use information from different sources.
Posted Date: 2/26/2013 2:10:44 AM | Location : United States







Related Discussions:- Software vulnerabilities, Assignment Help, Ask Question on Software vulnerabilities, Get Answer, Expert's Help, Software vulnerabilities Discussions

Write discussion on Software vulnerabilities
Your posts are moderated
Related Questions
Problem : (a) Provide one possible classification of PCA, ART, RBF, and Fuzzy ARTMAP networks. (b) Describe in detail the characteristics of Radial Basis Function Neural Net

(a) Briefly explain the following security goals provided by cryptography: confidentiality, authentication, integrity and non-repudiation. (b) State Kerckhoff's Princip

TRANSPORT PROTOCOLS: Give application-to-application communication. Require extended addressing mechanisms to check applications. Are known end-to-end communicatio

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •    Apply safeguards wh

Problem: (a) Assume that a new application layer protocol is developed for video conferencing application. Which transport layer protocol, between TCP and UDP, will you u

What is one-time pad for encryption?  Describe how it offers both Confusion and Diffusion. Using the letter encoding discussed in class (along with one-time

Question: Spreadsheet packages are widely used in Business. a) Explain why spreadsheets are so useful. b) Spreadsheet files are sometimes saved for use by other software

QUESTION (a) Briefly explain the contents of the Needs Analysis, which is step in the process of network design. (b) Describe on the three ways of improving the performan

ADDRESS RESOLUTION WITH TABLE LOOKUP : Resolution needs data structure that has information about address binding. A distinct address-binding table is used for every physical n

Question: Human telephone conversations are characterized by irregular pauses, alternating with irregular bursts of speech. In contrast, communication via computers is char