Explain the benefits of the concept of depth in cyber defense and what aspects limit its effectiveness

User Generated

Nynfdnu

Computer Science

Description

1-What steps should one take to head off an attack of ransomware?

2-What are the differences between rootkits, worms, viruses and trojans?

3-What techniques can the bad actors use to masquerade or divert attention from attack vectors?

4-Describe RSA encryption for public/private keys, the mathematical mechanism that makes it work, and what future technologies could invalidate our means to ensure encrypted transmissions.

5-Describe the amplification effect of large-scale DDOS attacks.

6-Why are bot-nets so hard to detect and eliminate?

7-Explain the vulnerabilities in the network protocol TCP/IP that make it a target for cyber exploitation (give an example)

8-Name the important aspects of four-part access control and how they eliminate risk for organizations?

9-Explain the telemetry mechanisms the security community uses to foster its threat intelligence.

10-Explain the process of creating a business continuity plan and how to assure it will work?

11-When building targeted attacks, name 3 things that you would incorporate to make sure the attack reached its objectives?

12-f you were a bad actor, what tactics would you use to maintain anonymity throughout the attack?

13-What things can be done to prevent sql injection attacks?

14-Name three reasons why the man in the middle attacks are particularly nefarious?

15-Name and justify the top three threats to our network of networks in the coming decade?

16-What is the number one mechanism that security operations can do to deter cyber attacks?

17-How do security policies help protect the security triad?

18-Explain how the security review cycle limits risk to the organization?

19-Where is the most dangerous city on the Internet? And why?

20-Explain the benefits of the concept of depth in cyber defense and what aspects limit its effectiveness.?



User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hey please find all the correct answers to the questions in the attached word file.

1-What steps should one take to head off an attack of ransomware?
Back up all the data
Data backups should be utilized on a daily basis. External drives are usually the best for back up
support or a cloud-based system like Drop Box or Google Drive.
Use of security software that implements whitelisting technology
Whitelisting permits only safe programs to execute in the process blocking ransomware
successfully.
Application and Operating System Security
All software applications should be updated as soon as the updates become available.
Training and Awareness
Employees should undertake cyber security training as this will enable them to be careful and fully
aware of this kinds of attacks.

2-What are the differences between rootkits, worms, viruses and Trojans?
Rootkit is a computer programs designed by attackers to gain root or administrative access to a
computer. Once an attacker gains admin privilege, they go ahead to exploit the system. The
attacker usually gains super user privileges by altering something in the boot sequence
A worm is a program or algorithm that replicates itself over a computer network and usually
performs malicious actions. Worms have the capability of travelling without any human action.

Worms are normally self-replicating and do not not require host program or human invocation to
propagate.
Virus is a computer program that attaches itself to executable program or files enabling it to spread
from one computer to another, leaving infections as it travels. It is usually self-replicating and
attacks programs to gain access to computers or network
Trojan horse is a program that appears useful by pretending to do certain things in foreground, but
is works in background with the goal of harming the computer or stealing valuable information. It
usually hides inside or masquerades in useful program.

3-What techniques can the bad actors use to masquerade or divert attention from attack
vectors?
Bad actors can use low-level DDoS attacks to distract the security response teams. DDoS toolkit
may be utilized to divert the security organs’ attention away from the real attacks.
The attacks are used by cybercriminals to distract businesses while bad actors sneak in through the
back door. They also use this attacks to mask malware injections.
Attackers can also produce large amounts of alerts to desensitize security teams and distract them
from the real attack.

4-Describe RSA encryption for public/private keys, the mathematical mechanism that makes
it work, and what future technologies could invalidate our means to ensure encrypted
transmissions.
In RSA cryptosystem, the encryption key is public and it is different from the decryption key which
is kept secret and private. It uses two different but mathematically linked keys, one public and one
private. The public key can b...


Anonymous
Just what I needed. Studypool is a lifesaver!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags