COSC2651 Security In Computing And IT

Task 1

Using your skills learnt in Practical 01, select a recent (not older than three months) vulnerability from the National Vulnerability Database and analyse it from the following aspects:

  1. Provide a detailed description of the vulnerability. (Include the NVD url link)
  2. Impact (Access Vector, Complexity, Authentication, Impact type etc) including CVSS Score version 2 and version 3.
  3. Explain the purpose of using CVSS scores.
  4. Proposed Solution (Screenshot Accepted. Must also include URL of vendor solution)
  5. Examine the ASD’s Strategies to Mitigate Cyber Security Incidents at: https://www.cyber.gov.au/acsc/view-all-content/publications/strategies-mitigate-cyber-security-incidents

Identify which strategies mitigate the vulnerability? As part of your solution you must provide a valid explanation of how each chosen strategy will be effective. You must provide at least two strategies. In the event that only one is applicable, you must clearly explain why all other strategies are not effective.

Task 2

Search a number of antivirus companies’ websites (e.g. Symantec, McAfee, Kaspersky, F-Secure, AVG, Bit Defender, Webroot, ESET, G-Data, Avira, Lavasoft, Microsoft etc.). Find at least four sites that publish malware listings, and compare their malware lists.

  1. List the four sites. (include URL)
  2. Discuss how descriptive and informative the sites are. (include screenshots, Compare at least 4 key criteria across the sites: Risk Criticality, Date, Recommendation, Description)
  3. Try to compare the malware listings (in terms of completeness of their malware listings and how up to date their listings are). Explain the problems with attempting to compare the malware listings of each site in this way.
  4. Given the differences in the way each site presents this information, which site would you recommend and why?

Task 3

Select two recent, different threats from an antivirus company’s database. Describe for each:

  1. The descriptions and URL references to the two threats
  2. How the threat spread (two or more attack strategies)
  3. The targets of malicious activity (information, resource etc.)
  4. The ways of hiding inside the victim’s computer (avoids detection)
  5. At least two preventative measures the user could take to avoid the threat.

Task 4

In a given system, passwords are required to be 8 to 12 characters in length.

Each character can be any alphanumeric character and passwords are case sensitive.

For authentication matching purposes, all passwords are hashed and stored in a password file.

The password file contains 1024 password hash values, with each belonging to a single user in the system.

Suppose an intruder has gotten access to the password file and the intruder has a dictionary containing 216 common passwords and there is a 6.25% chance that any given password is in that dictionary.

In addition the intruder has a computer that can generate and compare 109 hashes per second.

  1. How many different passwords are possible? What if the password was not case sensitive? Explain your answer and show all calculations and results.
  2. How many years would it take to check every possible valid password combination (in both cases above)?
  3. Suppose the intruder wants to recover the password of Bill, who is a user in the system. Right now the intruder only has Bill’s password hash value in the password file. Using the intruder’s dictionary, what is the number of hash operations that the intruder expects to compute in order to find out Bill’s password, given the 6.25% chance that any given password is in the dictionary as mentioned above? Assuming that the intruder has a computer which can generate 109 hashes per second, how long would this take?Explain your answer and show all calculations and results.
  4. What is the probability that at least one of the 1024 passwords kept in the system actually exists in the intruder’s dictionary?

Task 5

The delays and uncertainty over the recent US election have highlighted areas where security and technology both aid and limit the effectiveness of such systems.

Investigate various electronic election voting systems, their benefits and their various issues.

Contrast this against the pre-existing manual (in person and postal) voting processes and how these issues are addressed.

As part of your investigation, determine the types of attacks and security limitations that each is susceptible to. How do poorer countries without infrastructure deal with these issues?

How are issues such as non-repudiation, duplicate voting and other types of voter fraud detected and prevented in manual voting? What mechanisms and technologies are available to deal with these issues in electronic voting systems?

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
error: Content is protected !!
Open chat
1
You can contact our live agent via WhatsApp! Via + 1 (929) 473-0077

Feel free to ask questions, clarifications, or discounts available when placing an order.

Order your essay today and save 20% with the discount code SCORE