ASS 4 secu 422
docx
keyboard_arrow_up
School
New Jersey City University *
*We aren’t endorsed by this school
Course
422
Subject
Electrical Engineering
Date
Apr 3, 2024
Type
docx
Pages
2
Uploaded by BarristerJackalMaster1076
Describe leading threats (Virus, Worm, Trojan Horses, Rootkits, Social Engineering, and Botnet).
Describe the malware detection symptoms.
Describe defense in depth.
1.
Leading threats in the realm of cyber security start with viruses. Viruses is a malicious software that attaches itself to legitimate files in order to spread from one computer to the other. Worms on the other hand is a standalone program that replicates itself through networks without requiring any authorization. The most effective in my opinion trojan horse is a malware that not only disguises as a legitimate software, but it tricks users into downloading the software which can be done in a single click. Rootkit on the other hand is malware that is designed to conceal their presence on a system while providing unauthorized access to an attacker. Furthermore, social engineering is a technique in which attackers manipulate individuals’ confidentiality to provide them restricted access. This form of threat conjoined with a trojan horse, or a worm is very effective. Lastly, a botnet is a network of compromised bots that control a single entity. They are normally more effective in a large number of computers with other malware like worms or viruses. 2.
The malware detection system includes software like Network intrusion
detection, Host intrusion detection, antivirus, and security auditing. These systems input servers and system logs that are well coordinated
and co relates logs from many systems which tract the status of incident disclosure. 3.
Defense in the field of cyber security has many different layers beginning with perimeter defense, networks security, end point security, IAM and security monitoring/incident report. Network security is the farthest layer of defense which focuses on protecting the network’s perimeter from any unauthorized users. This can be as simple as a firewall or security gateway device. Network security on the other hand protects the internal network traffic k and communications this can involve NAC and VPNS. Furthermore, end point security refers to computer’s smartphones and servers; these are
all devices that represent a potential entry point for hackers. Devices like host-based firewalls or EDR systems are used while securing and organizations endpoint. IAM other know as identity and access management identifies all the access rights and maintains them secure. Solutions can involve MFA, SSO, and cross sire scripting. Lastly,
Incident response/security monitoring handles specifics attack
incidents. This group is a team of different specialists that have knowledge relating network protocols, OS, physicals security issues and malicious code.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
MAKE A FLOW CHART AND EXPLAIN
arrow_forward
7. At laundromats, using coins and/or pre-paid cards will turn on a dryer machine which
consists of a heating source and a motor that turns the inner cylindrical chamber where
the wet fabrics are placed. Once a certain amount of time has passed, the dryer will
automatically turn off.
a) Please create a combination logic gate using AND, NOT and/or OR logic gates that
would simulate the logic gate circuit necessary to produce the same outcome as a
timed dryer machine. Be sure to properly label and explain your logic gate system.
b) Please create a combination logic gate using only NAND logic gates that would
simulate the logic gate circuit necessary to produce the same outcome as a timed
dryer machine. Be sure to properly label and explain your logic gate system.
arrow_forward
3.
arrow_forward
I need the correct answer, not the explanation
arrow_forward
I need the drawing of the circuit. "convert the SOP (AND/OR) circuit diagram into one containing only NAND and NOR gates."
I have included the picture of the SOP Circuit that needs to be converted. Please draw the circuit clearly and answer question 1 completly, thanks...
quick response gets thumbs up
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you

EBK ELECTRICAL WIRING RESIDENTIAL
Electrical Engineering
ISBN:9781337516549
Author:Simmons
Publisher:CENGAGE LEARNING - CONSIGNMENT
Related Questions
- MAKE A FLOW CHART AND EXPLAINarrow_forward7. At laundromats, using coins and/or pre-paid cards will turn on a dryer machine which consists of a heating source and a motor that turns the inner cylindrical chamber where the wet fabrics are placed. Once a certain amount of time has passed, the dryer will automatically turn off. a) Please create a combination logic gate using AND, NOT and/or OR logic gates that would simulate the logic gate circuit necessary to produce the same outcome as a timed dryer machine. Be sure to properly label and explain your logic gate system. b) Please create a combination logic gate using only NAND logic gates that would simulate the logic gate circuit necessary to produce the same outcome as a timed dryer machine. Be sure to properly label and explain your logic gate system.arrow_forward3.arrow_forward
- I need the correct answer, not the explanationarrow_forwardI need the drawing of the circuit. "convert the SOP (AND/OR) circuit diagram into one containing only NAND and NOR gates." I have included the picture of the SOP Circuit that needs to be converted. Please draw the circuit clearly and answer question 1 completly, thanks... quick response gets thumbs uparrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- EBK ELECTRICAL WIRING RESIDENTIALElectrical EngineeringISBN:9781337516549Author:SimmonsPublisher:CENGAGE LEARNING - CONSIGNMENT

EBK ELECTRICAL WIRING RESIDENTIAL
Electrical Engineering
ISBN:9781337516549
Author:Simmons
Publisher:CENGAGE LEARNING - CONSIGNMENT