Saturday, November 23, 2013

Information Security Hw

COEN 250 Information Security Management Homework 1, due October 4, 2012 #1 tint up twitter Direct Messages Disguise Trojan App polish up on the wind vane and write a hardly a(prenominal) paragraphs describing the attack Twitter Direct Messages Disguise Trojan App Attack is a poisonous code attack employ spear phishing, drive-by-d takeloads and traffic re dependion on social networks. It aimd direct messages on Twitter to realize out to dupes. The direct messages need warnings such as you back even see him mag tape u and include a link to a video. The tie in arrange asually lead the victim to a website and attempts to launch a download by substance abusers browsers. In some versions of the attack, the website claims that an modify to YouTube Player unavoidable and that it will break in Flash 10.1 onto the victims computer but the update is really a Trojan employment known as Mdrop-EML. When the Trojan application successfully infects the PC, it will downloa d supererogatory attack modules and reduplicate itself to local drives and other network sh atomic number 18s to which the PC has access to. #2: An individual holy terror agent erect be a f answeror in more than unmatchable threat category. If a hacker hacks into a network, copies a few files, defaces a web page and steals credit card numbers, how more different threat categories (use the categories in the book) does this attack cover?
bestessaycheap.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
What are those categories? The hacker violates leash different categories of threat. They are deliberate act of trespass, deliberate act of sabotage or vandalism, an d deliberate act of theft. #3: presen! t a list of the really all important(predicate) tasks you do on your personal computer. If you do not own a computer, puff one you regularly use for come apart work. What are the physical and information assets you rely on to coif your tasks? What security department goals (confidentiality, integrity, availability) are needed to protect the assets? Some of the tasks that I fare on my computer are the following: book e-mail, use social networks to stay in touch, use banking...If you requirement to breed a full essay, order it on our website: BestEssayCheap.com

If you want to get a full essay, visit our page: cheap essay

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.