.

Thursday, February 28, 2013

Information Security Hw

COEN 250 Information Security Management
Homework 1, due October 4, 2012

#1 tint up twitter Direct Messages Disguise Trojan App polish up on the web and write a hardly a(prenominal) paragraphs describing the attack
Twitter Direct Messages Disguise Trojan App Attack is a poisonous code attack using spear phishing, drive-by-d takeloads and traffic redirection on social networks. It used direct messages on Twitter to realize out to dupes. The direct messages have warnings such as you back even see him taping u and include a link to a video. The links arrange asually lead the victim to a website and attempts to launch a download by substance abusers browsers.
In some versions of the attack, the website claims that an modify to YouTube Player unavoidable and that it will install Flash 10.1 onto the victims computer but the update is really a Trojan application known as Mdrop-EML. When the Trojan application successfully infects the PC, it will download supererogatory attack modules and copy itself to local drives and other network sh ares to which the PC has access to.

#2: An individual threat agent erect be a factor in more than unmatchable threat category. If a hacker hacks into a network, copies a few files, defaces a web page and steals credit card numbers, how more different threat categories (use the categories in the book) does this attack cover?

Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!

What are those categories?
The hacker violates three different categories of threat. They are deliberate act of trespass, deliberate act of sabotage or vandalism, and deliberate act of theft.

#3: Make a list of the really all important(predicate) tasks you do on your personal computer. If you do not own a computer, describe one you regularly use for come apart work. What are the physical and information assets you rely on to coif your tasks? What security goals (confidentiality, integrity, availability) are needed to protect the assets?
Some of the tasks that I perform on my computer are the following: book e-mail, use social networks to stay in touch, use banking...If you requirement to get a full essay, order it on our website: Ordercustompaper.com



If you want to get a full essay, wisit our page: write my paper

No comments:

Post a Comment