New! Hire Essay Assignment Writer Online and Get Flat 20% Discount!!Order Now
CPT251
AU
Open Universities Australia
Using your skills learnt in Practical 01, select a recent (not older than three months) vulnerability from the National Vulnerability Database and analyse it from the following aspects:
a) Provide a detailed description of the vulnerability. (Include the NVD url link)
b) Impact (Access Vector, Complexity, Authentication, Impact type etc) including CVSS Score version 2 and version 3. (Screenshot Accepted)
c) Explain the purpose of using CVSS scores. (Two valid bullet points expected. This must be explained in your own words)
d) Proposed Solution (Screenshot Accepted. Must also include URL of vendor solution)
e) Examine the ASD’s Strategies to Mitigate Cyber Security Incidents at:
Identify which strategies mitigate the vulnerability? As part of your solution you must provide a valid explanation of how each chosen strategy will be effective. You should provide at least two strategies. In the event that only one is applicable, you must clearly explain why other strategies are not effective.
Search a number of antivirus companies’ websites (e.g. Symantec, McAfee, Kaspersky, F-Secure, AVG, Bit Defender, Webroot, ESET, G-Data, Avira, Lavasoft, Microsoft etc.). Find at least four sites that publish malware listings, and compare their malware lists.
a) List the four sites. (include URL)
b) Discuss how descriptive and informative the sites are. (include screenshots, Compare at least 4 key criteria across the sites: Risk Criticality, Date, Recommendation, Description)
c) Try to compare the malware listings (in terms of completeness of their malware listings and how up to date their listings are). Explain the problems with attempting to compare the malware listings of each site in this way.
d) Given the differences in the way each site presents this information, which site would you recommend and why?
Select two recent, different threats from an antivirus company’s database. Describe for each:
a) The descriptions and URL references to the two threats
b) How the threat spread (two or more attack strategies)
c) The targets of malicious activity (information, resource etc.)
d) The ways of hiding inside the victim’s computer (avoids detection)
e) At least two preventative measures the user could take to avoid the threat.
You receive notification that your main email account has been compromised.
a) Identify and explain 3 ways that this may have been carried out.
b) Identify the various steps you need to take to mitigate the threats that you now face and how to prevent this from happening again.
c) Identify and explain any tools you could use to help you in this process.
Investigate the Intel Management Engine.
a) Identify what it is. What is the AMD equivalent?
b) Investigate and explain why it is a security concern. What is Intel’s response to this? How have computer vendors responded to this? Look for articles that discuss this in the media, and discuss the general consensus from security experts.
c) What measures are available to minimise these security concerns and how effective are they. Investigate and report if your own pc/laptop is affected by it (or the AMD equivalent).
15,000+ happy customers and counting!