ITSS430Fall23_HW2

docx

School

University of Texas, Dallas *

*We aren’t endorsed by this school

Course

100

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

7

Uploaded by BaronWaterKangaroo174

Report
Network and Information Security - ITSS4360 Fall 23 Homework 2 Due Monday 10/16/23, 11.59 p.m. on eLearning Student Name: ___Krish Parikh________________________________________ 1. ____ Trojan Horse ________program contains hidden code that is malicious. A. Melissa B. Mirai C. Trojan Horse D. Spyware 2. One method malware analysis involves running potentially malicious code in an emulated ___ Sandbox ______ A. Game console B. Sandbox C. Dashboard D. Cockpit 3. Someone calling the help desk and persuades them to reset a password for them for hacking is a(n) __ Social Engineering __________ attack A. Spam B. DDOS C. Social Engineering D. Replay 4. Perimeter monitoring includes ingress monitoring and ___ egress ________ monitoring A. Cloud B. Digital C. Egress D. Web 5. __ Macro Virus _____ exploits the support for active content using a scripting language, embedded in an office document A. Traitor B. Phishing C. DocuSign D. Macro Virus Page 1 of 7
Network and Information Security - ITSS4360 Fall 23 Homework 2 6. ____ Polymorphic _____ virus can produce variation of its own copies and can hide from a scanner. A. Corona B. Vampire C. Bluefish D. Polymorphic 7. Sometimes known as a “logic bomb”, the ___ trigger _______ is the event or condition that determines when the payload is activated or delivered can copy itself from a system to a remote system after logging into the remote system A. Alarm B. Reboot C. Trigger D. Shutdown 8. A ___ drive-by-download _______ is when a user views a Web page controlled by the attacker that contains a code that exploits the browser bug and downloads and installs malware on the system without the user’s knowledge or consent. A. Phishing attack B. Injection attack C. Drive-by-download D. Cross-site scripting attack 9. ___ Clickjacking _______ is also known as user-interface (UI) redress attack. A. Phishing B. Clickjacking C. Mobile phone worm D. Spyware Page 2 of 7
Network and Information Security - ITSS4360 Fall 23 Homework 2 Match up the Entries DDOS Advanced Persistent Threat Ransomware Actor Attack kit Mobile Trojan Ransomwar e Angler           Skuller          X   WannaCry            X Botnet  X           Stuxnet    X         Astro      X       Page 3 of 7
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Network and Information Security - ITSS4360 Fall 23 Homework 2 10. Describe the methods used by a computer worm to replicate itself Electronic mail or instant messenger facility: the worm e-mails a copy of itself to other systems, and sends itself as an attachment via an instant message service. File Sharing: Creates a copy of itself or infects a file as a virus on removable media. Remote execution capability: the worm executes a copy of itself on another system. Remote file access or transfer capability: the worm uses a remote file access or transfer service to copy itself from one system to the other. Page 4 of 7
Network and Information Security - ITSS4360 Fall 23 Homework 2 11. Describe how the various generations of Anti-Virus software solutions function in protecting against malware 1. First Generation: Simple Scanners a. Requires a malware signature to identify the malware and is limited to the detection of known malware. 2. Second Generation: Heuristic Scanners a. Uses heuristic rules to search for probable malware instances. Another approach includes integrity checking. 3. Third Generation: Activity Traps a. Memory-resident programs that identify malware by its actions rather than its structure in an infected program. 4. Fourth Generation: Activity Traps a. Packages consisting of a variety of anti-virus techniques used in conjunction, which Include scanning and activity trap components and access control capability. Page 5 of 7
Network and Information Security - ITSS4360 Fall 23 Homework 2 12. Describe MITRE ATT&CK framework detailing the model characteristics and how it helps in cybersecurity illustrating examples of its usage. It is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. It also works as a model mapping cyber adversary behavior, reflecting the various phases of an adversary’s lifecycle and the platforms they are known to target. This model helps with the goal of providing maximum protection through asset coverage, deployment completeness, and system configuration. ATT&CK includes a wide set Tactics and Techniques, which includes 12 Tactics and more than 280 Techniques. It also supports Operating Systems such as Windows, Mac OS, and Linux. Page 6 of 7
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Network and Information Security - ITSS4360 Fall 23 Homework 2 Page 7 of 7