Explain the purpose of using cvss scores

Assignment Help Computer Network Security
Reference no: EM1388606

Part- A

During the labs we used the National Vulnerability Database. Select a recent vulnerability from that Database and analyse it from the following aspects:

• What problems they can cause (malicious activities an attacker may use them for, including attack types)
• Criticality level
• Impact including CVSS Score.**
• Proposed Solution
• Which of the Australian DSD '35 Strategies can be applied to mitigate the vulnerability. You must explain why the solution mitigated the vulnerability.

Include valid explanations and sources for your answer.

**Note: When stating the Impact, you must provide the following information:

CVSS v2 Base Score (specified if available)

Impact Subscore (specified if available)

Exploitability Subscore (specified if available)

Access Vector (specified if available)

Access Complexity (specified if available)

Authentication (specified if available)

Impact Type (specified if available)

Part - B

Explain the purpose of using CVSS scores.

Reference no: EM1388606

Questions Cloud

Twice as many fishing boat as ski boat respectively : The company has incurred fixed costs of $2,800,000 to set up its manufacturing operation.If company plans to produce twice as many fishing boat as ski boat respectively with propotion 2:1:1
Lichen diversity and abundance to measure air quality : Discuss how could you use lichen diversity and abundance to measure air quality? How would you expect lichen diversity to vary with respect to distance from the major metropolitan areas?
What is the frequency of the beat note : Two ambulances move toward each other on a straight road. Each travels at a speed of 65 mph. The siren on each ambulance produces a sound wave of frequency 460 Hz. (Take the speed of sound in air to be 340 m/s.)
Healthcare manager decision making : Researching further for more information, research the Centers of Disease Control and Prevention or the World Health Organization data and statistics relating to the national and global findings.
Explain the purpose of using cvss scores : Select a recent vulnerability from that Database and analyse it from the what problems they can cause (malicious activities an attacker may use them for, including attack types)
Living organisms to control pests : Use living organisms to control pests are often used in many nations. What factors must be taken into account in using fungi to combat agricultural pests?
Anatomical and chemical traits : Assyme you are shown an object that looks superficially like a pale green mushroom. Explain at least three criteria that would enable you to tell whether the object is a piece of a plant or a piece of a fungus.
At what angular speed should it spin : If the arm is 5.50-m long and pivots about one end, at what angular speed (in rpm) should it spin so that the acceleration of the lander is the equal as acceleration because of gravity at the surface of Europa? The mass of Europa is 4.8 times 10^ ..
Find the median grade point average : The grade point averages of 10 students are listed below. Find the median grade point average. 3.15, 3.62, 2.54, 2.81, 3.97, 1.85, 1.93, 2.63, 2.50, 2.80

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd