Security Science 

Ans A:

One must have access to various computers, access to high speed internet and ability to configure Windows and Linux networking systems in addition to being able to work with server virtualization.

Ans B:

 Botnet can be built using freely available botnet builder tool. The tools are installed in a computer and by using command lines, the bot can be configured on the functionalities it will be carrying out

Ans A:

A rootkit is a unique form of malicious software, and are unique for the reason that the user lacks knowledge of what they are doing in the system. Arguably, rootkits are virtually untraceable, and they are more or less not possible to get rid of. Even though recognition paraphernalia are flourishing, developers of malware are continually searching novel means to cover up their paths. 

Ans B:

Avoiding rootkits from compromising the system is the most excellent policy the user can employ, and this is performed with the similar defense-in-depth policy that the user must employ to avoid all malware from harassing his/her computer. What’s more, defense-in-depth elements comprise regular software updates, virus scanners, a firewall on the network and host, as well as a strong code word plan.

Ans A:

 In man-in-the middle attack, the attacker is capable of intercepting messages in a free open WIFI network which use public key exchange. Attackers substitute the public key using his own and communicate with the users.

 

 

Ans B:

I  man-in-the middle attack, attackers makes use of a software to deceive the clients that he/she is the server in order to gain access and or modify any messages being transmitted over a publicly available network.

Ans A:

Browser security is the Internet safety measures application to web browsers with the purpose of securing computer systems and networked information from infringes of malware or confidentiality. Arguably, browsers security manipulations time and again make use of JavaScript, at times with XSS or resulting payload through Adobe Flash. In essence, protection manipulation can as well benefit from susceptibilities that are usually taken advantage in every browser.

Ans B:

At any time, a browser connects with a web site; site, as an element of that connection, gathers some data concerning the browser (so as to process the page formatting to be conveyed). In this regard, if malevolent cipher has been introduced into the content within the website, or in the most horrible situation, the website that has purposely been developed to host malevolent cipher, in that case susceptibilities precise to a certain browser can permit this malevolent code to run functions in the application of the browser in unintentional manner (and keep in mind, one of the data bits  that website gathers from the communication of the browser is the identity of the browser- permitting definite susceptibilities to be used).

Ans A:

DLP are a perimeter-level and symptomatic solutions that are employed in protecting and securing sensitive computer data and/or information from attacks.

Ans B:

 DLP are data protection solutions that emphasize on preventing illegitimate data transfer by making use of endpoint technologies, network protections and server protections.  

 

Ans A:

Network security is crucial in ensuring integrity of all information assets for instance computers. Therefore, I would make use of Snort intrusion prevention and detection system and it has no cost as it is open source software.

Ans B:

Most intrusion prevention and detection systems are proprietary and must be bought. The fact that Snort is free and the importance of having such a system in order to secure network system, I would implement it. 

Ans A:

SYN flood attacks make use of Transmission Controls Protocol thereby rendering server to fail in responding to genuine requests by clients. It can be controlled through the use of filtering techniques as outlined in RFC 2827.

Ans B:

SYN flood attacks are type of attacks that attacks SYN bits within the TCP/IP header in which case the attacker creates packets with illegitimate source IP addresses. It can be controlled via Firewalls and Proxies machines

Ans A:

Worldwide Interoperability for Microwave Access (WiMAX) is a communication standard that is wireless developed to offer between 30 to 40 Mb/s.  Long-term evolution (LTE), which is promoted as 4G LTE, is a wireless communication standard of prompt data for data terminals and cell phones.

Ans B:

In comparison, MAX Sprint application should distribute 30-40Mbps speeds of downloading while LTE can convey up to 100Mbps.

Ans A:

A public key infrastructure (PKI) sets up and retains a dependable networking setting by offering certificate and key management services

Ans B:

PKI facilitate digital signature and encryption capabilities athwart applications all in a way that is crystal clear and simple to apply.

Ans A:

Boost protection by offering a suitable and inexpensive extra security tier. Ease fraud by using rigid-to-forge materials and technologies.

Substitute hard to memorize passwords which may perhaps be common or observed and incorporate a broad array of biometric technologies and resolutions, client applications and databases into a scalable and robust control resolution for network and facility access

Ans B:

Arguably, the finger print for Chemical industries employees is time and again influenced; hence, such companies ought not to utilize the finger print as means of verification.

Research points out that, the voice of an individual varies with age as well when the individual has respiratory tract or throat infection the voice alters or if there are surplus noise in the surroundings this technique may perhaps not validate properly; thus, this technique of authentication is not practical continually

Ans A:

Hashing offers a more dependable and supple technique of data extraction as compared to other data configuration and it is more rapidly than looking for lists and arrays. Different from any other information framework hashing does not establish what tempo the user will obtain; with hashing one can select the time-space transaction to create.

Ans B:

The point of the hashing password is to make it impossible to pre-compute feasible password hashes in a computational manner, since the random salt halts the pre-computation procedure. It as well points out that if the equivalent password is employed at distinct sites, it cannot be palpable by merely looking at the values of the (salted hashed) password since the salts will be distinct at the diverse sites; thus, the value of the resultant hash will be dissimilar.

  1. Do web research and read about Digital Certificates. Write a 3 sentence summary.

Ans A:

Digital certificates are electronic documentations utilized to verify the web individuals or organization and it is provided by a certification authority.

Ans B:

Digital certificates comprises user’s name, cessation dates, a serial number, a replica of the certificate  public key of the holder (utilized for encrypting digital signatures and messages), and the certificate-issuing authority digital signature , which as a result, the receiver can confirm that the certificate is authentic.

 

  1. What is a hot site?

Ans A:

A hot site is a profitable calamity recovery service that permits an enterprise to carry on with the network and computer processes in the occurrence of an equipment or computer adversity. For instance, if the business information center turns out to be fatal, that organization can shift all information processing processes to a hot site.

Ans B:

What’s more, hot sites have every tool required for the organization to carry on with its operation, which entails receiver jacks, office space and fittings, and computer tools.

 

  1. Assume you are responsible for security for a small company (40 PCs) running a web based business with direct commerce, selling custom T shirts. All of the company data (customer info, order info, employee information, company accounts, taxes, et al) distributed across the 40 PCs. Summarize for the owner your list of key risk mitigation strategies for the network and the IT infrastructure

Ans A:

Analogue/ISDN Line Policy: will describe the standards to utilize in ISDN and analogue lines for transmitting and receiving faxes and for PC connection). Remote Access Policy: will classify the standards for integrating to the company network from any network or host, which is outside the organization.

Ans B:

 Personal communication device policy: will identify the data security’s prerequisites for private communication gadgets, like Smartphone, voicemail, and tablets. VPN Security Policy: will define the specifications for far-flung access Layer 2 Tunneling Protocol (L2TP) or IP Security (IPSec) VPN links to the company network.

 

What We Offer: