Explain the purpose of using cvss scores

Assignment Help Computer Network Security
Reference no: EM1388606

Part- A

During the labs we used the National Vulnerability Database. Select a recent vulnerability from that Database and analyse it from the following aspects:

• What problems they can cause (malicious activities an attacker may use them for, including attack types)
• Criticality level
• Impact including CVSS Score.**
• Proposed Solution
• Which of the Australian DSD '35 Strategies can be applied to mitigate the vulnerability. You must explain why the solution mitigated the vulnerability.

Include valid explanations and sources for your answer.

**Note: When stating the Impact, you must provide the following information:

CVSS v2 Base Score (specified if available)

Impact Subscore (specified if available)

Exploitability Subscore (specified if available)

Access Vector (specified if available)

Access Complexity (specified if available)

Authentication (specified if available)

Impact Type (specified if available)

Part - B

Explain the purpose of using CVSS scores.

Reference no: EM1388606

Questions Cloud

Twice as many fishing boat as ski boat respectively : The company has incurred fixed costs of $2,800,000 to set up its manufacturing operation.If company plans to produce twice as many fishing boat as ski boat respectively with propotion 2:1:1
Lichen diversity and abundance to measure air quality : Discuss how could you use lichen diversity and abundance to measure air quality? How would you expect lichen diversity to vary with respect to distance from the major metropolitan areas?
What is the frequency of the beat note : Two ambulances move toward each other on a straight road. Each travels at a speed of 65 mph. The siren on each ambulance produces a sound wave of frequency 460 Hz. (Take the speed of sound in air to be 340 m/s.)
Healthcare manager decision making : Researching further for more information, research the Centers of Disease Control and Prevention or the World Health Organization data and statistics relating to the national and global findings.
Explain the purpose of using cvss scores : Select a recent vulnerability from that Database and analyse it from the what problems they can cause (malicious activities an attacker may use them for, including attack types)
Living organisms to control pests : Use living organisms to control pests are often used in many nations. What factors must be taken into account in using fungi to combat agricultural pests?
Anatomical and chemical traits : Assyme you are shown an object that looks superficially like a pale green mushroom. Explain at least three criteria that would enable you to tell whether the object is a piece of a plant or a piece of a fungus.
At what angular speed should it spin : If the arm is 5.50-m long and pivots about one end, at what angular speed (in rpm) should it spin so that the acceleration of the lander is the equal as acceleration because of gravity at the surface of Europa? The mass of Europa is 4.8 times 10^ ..
Find the median grade point average : The grade point averages of 10 students are listed below. Find the median grade point average. 3.15, 3.62, 2.54, 2.81, 3.97, 1.85, 1.93, 2.63, 2.50, 2.80

Reviews

Write a Review

Computer Network Security Questions & Answers

  Scenario-based project

Authentic Assessment:   The scenario will be a realistic, enterprise-level situation encompassing diverse networking components, including Microsoft Windows, Linux, VoIP, security, wireless, and Cisco technologies.

  Explain why asynchronous i/o activity is a problem

Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and paging. Suggest a solution to the problem.

  Defects of gsm networks

Security mechanism, threat, GSM networks, DDoS attacks, IPv4, IPv6, IPsec integrity, authentication and privacy, IPsec AH,  ‘single sign-on' in the context of access control, Secure Electronic Transaction (SET) protoco,  Encryption

  Efficient means of electronic payments

Think about security concerns and limited resources, do you think public sector entities should consider utilizing PayPal to facilitate inexpensive and efficient means of electronic payments?

  Attributes of company organizational culture

Some attributes of a corporation's organizational culture are so obvious that even an independent observer can feel them. Provide an example of such an observation and describe what cultural phenomenon it defines.

  Describing use of kerberos for mutual authentication

Answer the following in relation to a scenario where Bob and Alice use Kerberos for mutual authentication. When Bob receives a ticket from Alice, how does he know it is genuine?

  Explain security strategy for a corporate wan

Prescribe a security strategy for a corporate WAN. Be sure to include methods to combat both technical and nontechnical attacks. C

  Relationship between technical or it staff

Determine what your relationship would be like with the technical or IT staff at your corporation if you were working side by side on a project or training exercise?

  Advantage and disadvantage of key diversi?cation

Sally generates key KA when required as KA = h(Alice,KS ),with keys KB and KC generated in similar manner. Explain one advantage and one disadvantage of key diversi?cation.

  Create an overloaded constructor

Create the statements to make an overloaded constructor for the class named Car. The constructors should support 0, 1, or 2 arguments. The 1st argument will denote engine size and contain an Integer.

  Attacking the devises by doing buffer overflow

Implement buffer overflow in c++ And attacking the devises by doing buffer overflow.

  Analyze security requirements and prepare a security policy

Analyze security requirements and prepare a security policy.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd