EEGR 481 Network Security

0 comments

1. Threat, Vulnerability, Risk. Define each. Provide an example scenario and describe each of these 3 in that context.

2. Attack scenario phase 0 – Attacker places content on unpatched web site. Identify 3 Critical Controls that would deter this attack – explain how.

3. Attack scenario phase 1 – Attacker installs programs of the attacker’s choosing on the victim machine, using the privileges of the user who ran the browse. Identify 3 Critical Controls that would deter this attack – explain how.

4. Attack scenario phase 2 – Attacker uses outbound HTTPS access from victim to attacker. Identify 3 Critical Controls that would deter this attack – explain how.

5. Attack scenario phase 3 – attacker loads a local privilege escalation exploit program that allows the attacker to jump from the limited privilege user account to full system privileges. Identify 3 Critical Controls that would deter this attack – explain how

6. Attack scenario phase 4 – Windows pass-the-hash program to authenticate to another Windows machine on the enterprise internal network. Identify 3 Critical Controls that would deter this attack – explain how

7. Intrusion Detection & Protection System. Where in a network would you place an IDPS system? Suppose the attack was an illegal port scan, what methods are used by the IDPS for deter the attack? Explain the Type 1 and Type 2 Errors for this case.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}