We’ve discussed fundamental computer architecture, software and operating systems and now have a solid working knowledge of what happens when programs are being executed. We have also learned that malicious software is executed in the same manner as legitimate software. However, once “on the inside”, malicious software will often take advantages of weaknesses/ exploits within a system.
For this assignment, please answer the questions below. Note that for many of these questions, you may need to do some research (use books, the Web, etc.).
Questions:
- (2 points) What is a buffer overflow? Use the Internet to find a well-known buffer overflow attack (there have been several). In your own words, summarize how the attack works within a paragraph (please cite your source).
- (4 points) Choose a chapter in “The Art of Intrusion”, but NOT the first chapter on hacking the casinos. Summarize the methods used for the intrusion. Summarize the methods taken (if any) by the victim(s) to prevent future intrusions.
- (4 points) Read the article entitled, “Escaping Dark Age Cybersecurity” (link provided right under assignment link on Blackboard). Briefly summarize this article. What is meant by the “Motte and Baily” model? How should we be thinking differently about modern cybersecurity, escaping-dark-age-cybersecurity-thinking-3e7b0c74bda8


0 comments