Discuss the nature of the attacker

Assignment Help Software Engineering
Reference no: EM13150789 , Length: 1500 words

Part of the responsibilities of a practising security engineer is to stay abreast of developments in the eld, and to maintain awareness of emerging threats, vulnerabilities and response capabilities. The aim of this assignment is to demonstrate that you have begun to develop such an awareness, have assimilated the ideas of the course and understand how they apply to particular scenarios.

Write a report of around 1,500 words that discusses a major issue in security engineering that that was illustrated by actual events that occurred during this session, and which were reported in the popular or trade/technical press during that time. In your report, you should do the following:

Give a description of the facts of the case, in your own words. Preferably, you should draw on multiple sources of information. You should attempt to provide more detail on the details of the incident than is reported in the popular press, by using more technical sources that that take up discussion of the incident and go into technical details. Cite your sources.

Relate the facts of the case to any relevant aspects of security engineering discussed in class. For example, discuss the nature of the attacker, their motivations, the nature of the vulnerability that they exploited, the assets attacked, the consequences of the attack and any defensive actions that were taken in response to the attack.

Reflect on what can be learned from this attack. If you were hired as a security consultant to the organisation involved in this case, what speci c recommendations would you make? Are there any lessons for the eld more generally in this incident?

Reference no: EM13150789

Questions Cloud

Major sections of the classified balance sheet : Name and describe the major sections of the classified balance sheet. How is the classified balance sheet different than the balance sheet discussed in week one? What are some of the benefits in using a classified balance sheet?
Basics of preferred and common stockholders : How much will the preferred and common stockholders receive under each of the following assumptions:
Probability-student is both senior and chemistry major : Of these, 36 are seniors, 30 are chemistry majors, and 8 are neither. A student is selected at random from the class. What is the probability that the student is both a senior and a chemistry major?
Explain and identify the lewis acids in the two equilbrium : Identify the Lewis acids in the following two equilbrium systems: System A: CO2 + H2O ? H2CO3 System B: Zn2+ + 6H2O ? Zn(H2O)62+ A. A: H2O; B: H2O B. A: CO2
Discuss the nature of the attacker : Discuss the nature of the attacker, their motivations, the nature of the vulnerability that they exploited, the assets attacked, the consequences of the attack and any defensive actions that were taken in response to the attack.
What is the difference between dna, chromatin : One aspect of aging appears to be related to telomeres. Every time a chromosome is duplicated in the S Phase of interphase, the ends of the chromosome (i.e. telomeres) unravel. This sets a limit of around 50 cell divisions before the chromosome un..
Explain compounds would have the greater viscosity : Arrange these compounds in order of increasing boiling point and explain your reasoning. (assume similar mass) CH3OCH3 CH3CH2CH3 CH3CH2OH 2. Which of the following compounds would have the greater viscosity?
How many proteins would be in a typical raft : If a lipid raft is typically 70 nm in diameter and each lipid molecule has a diameter of 0.5 nm, about how many lipid molecules would there be in a lipid raft composed entirely of lipid?
Amount of paid-in capital in excess of par basics : If the bonds are converted into common, what is the amount of paid-in capital in excess of par to be recorded on the conversion of the bonds?

Reviews

Write a Review

Software Engineering Questions & Answers

  Design e-r diagram to review hospital documents

Design an E-R diagram for the following situations. From discussions with hospital staff, reviewing hospital documents and studying existing information systems, study team developed list of business rules

  Creating an ipo chart for programming problem

A contractor requires a program that computes and shows the volume of a rectangular pool of constant depth. Complete an IPO chart for this problem.

  Create plan for converting shareware version to full version

Create the plan for converting shareware version to full version without paying one cent. If it is not possible for shareware to be converted to full version

  Draw e-r diagram when doctor prescribe drugs for patients

Draw the E/R diagram for following situation: Doctors prescribe drugs for patients. A given doctor can prescribe many drugs for a certain patient.

  Create flow chart which gets customer account data

Create the flow chart which gets customer account data which comprises the account number, customer name, and balance due.

  Design state transition diagram for member state

Design a state transition diagram which explains typical member state and how they change based on specific actions and events.

  Brainstorming and delphi technique for risk identification

Discuss the difference between using brainstorming and the Delphi Technique for risk identification and determine some of the advantages and disadvantages of each approach?

  Data flow diagram for new customer support system

A context diagram, also called a Data Flow Diagram (DFD), documents the scope of the new customer support system. It focuses primarily on output from the system.

  Risc machine assembly

A compiler for a RISC machine will introduce delay slots into this code so that processor can employ the delayed branch mechanism.

  Process of life cycle-shining coyote experience in journey

Discover the shining coyote experience in journey to ixtlan. Examine from Edinger's perspective. Explain the complete process of life cycle.

  Finding output of the code sequence

Construct the pseudocode for a program that finds the sums of the numbers input that are greater than or equal to 10 and the numbers input that are less than ten.

  Development of a small software system

Analysis, design and development of a small software system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd