1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vichka [17]
4 years ago
10

Fullsoft, Inc. is a software development company based in New York City. Fullsoft’s software product development code is kept co

nfidential in an effort to safeguard the company’s competitive advantage in the marketplace. Fullsoft recently experienced a malware attack; as a result, proprietary information seems to have been leaked. The company is now in the process of recovering from this breach.
You are a security professional who reports into Fullsoft’s infrastructure operations team. The Chief Technology Officer asks you and your colleagues to participate in a team meeting to discuss the incident and its potential impact on the company.
Tasks
Prepare for the meeting by deliberating on the following questions:
• How would you assess the risks, threats, and/or vulnerabilities that may have allowed this
incident to occur, or could allow a similar incident to occur in the future?
• What insights about risks, threats, and/or vulnerabilities can you glean from reports of similar
incidents that have occurred in other organizations?
• What potential outcomes should the company anticipate as a result of the malware attack and
possible exposure of intellectual property?
• Which countermeasures would you recommend the company implement to detect current
vulnerabilities, respond to the effects of this and other successful attacks, and prevent future
incidents?
Computers and Technology
1 answer:
vfiekz [6]4 years ago
6 0

Answer:

Explanation is given below

Explanation:

A set of instructions runs on a system to do some actions that an attacker wants to do without the owners informed consent. It may be in the form of a virus, Backdoor, Trojan Horse, Rootkit, Scareware, Adware, and Worm.

1. This incident may occur due to:

sharing the file folders using USB's

propagation of e-mails

fake ant viruses

fake codec

through your browser

visiting infected web sites

installing infected software's and so on.

2. The worst that could occur with this incident are:

keylogger: software that can capture and record user keystrokes

backdoor: hidden method for bypassing normal computer authentication systems

zombie: computer attached to the Internet that has been compromised

denial-of-service attack (DoS attack): attempt to make a computer resource unavailable

3.

It steals the personal information such as email addresses, phone numbers, bank account numbers and so on.

It deletes or modifies the files.

Steals the software serial numbers and use our computers as relay.

4.

Usage of up-to-date antivirus which continuously analyze the behavior of your system.

Build a perfect malware detector

analyze program behavior

detect changes by using checksum methods

do the sandbox analysis.

change your passwords as you change your underwear.

Do not open unexpected e-mail attachments

Be wary of pop-up windows that ask you to install something (like anti-virus software) if you are just surfing the web.

Keep your system up-to-date. Newer systems automatically update.

firewall: software which inspects network traffic passing through it, and denies or permits passage based on a set of rules.

5. Outline of key points:

Circumstances related to Malware.

Insights about risks, threats, and/or vulnerabilities

Potential outcomes and possible exposure of intellectual property

countermeasures to detect vulnerabilities

You might be interested in
HELP QUICK!!!!!!!
iogann1982 [59]

Answer:

Number.

Letter is for columns, Number is for rows.

For example to find the cell on the fifth row, and 1st column, it would be A5.

6 0
2 years ago
Unlike images, tex and hyperlinks, vidoes _____ A) are playable in source view B are not used to affect user's emotions C) can b
KATRIN_1 [288]

Answer:

this is a tough question but I suggest that you choose c)

7 0
4 years ago
What is the minimum number of different résumé formats that an individual should have prepared?
Degger [83]

Answer:

The minimum number of different resumes formats that an individual should have prepared is b. 2 The first should be a condensed format. A good resume should only require one page. However, when things get too cramped in a single page, a two-page format can be used. A two-page format can be used to provide more details about yourself.

Explanation:

5 0
3 years ago
1. Write a program to prompt the user to enter a single character and respond back whether or not the character is valid dna. 2.
Nina [5.8K]

Answer:

Answer 1:

dna = input("Enter DNA type: ")

dna = dna.upper()

print(dna)

if dna == "A" or dna == "B" or dna == "Z":

   print("valid")

else:

   print("invalid")

Answer 2:

rna = input("Enter DNA type: ")

rna = rna.lower()

print(rna)

if rna == "m" or rna == "t" or rna == "r":

   print("valid")

else:

   print("invalid")

Answer 3:

dnaSquence = input("Enter the DNA sequence: ")

type = "valid"

for char in dnaSquence:

   if char not in ["A", "C", "G", "T"]:

       type = "invalid"

       break

print(type)

Answer 4:

rnaSquence = input("Enter the RNA sequence: ")

type = "valid"

for char in rnaSquence:

   if char not in ["A", "C", "G", "U"]:

       type = "invalid"

       break

print("valid")

Explanation:

There are three types of DNA; Type A, Type B and Type Z.

A DNA sequence consists of; A, C, G and T.

There are three types of RNA; mRNA, tRNA and rRNA.

An RNA sequence consists of; A, C, G and U.

Code Explanations:

Code 1:

dna = input("Enter DNA type: ")

dna = dna.upper()

print(dna)

if dna == "A" or dna == "B" or dna == "Z":

   print("valid")

else:

<em>    print("invalid")</em>

  1. prompts and Takes a single character input
  2. converts the character to upper case
  3. compares the input to the DNA types
  4. Prints "valid" for a valid input else prints "invalid"

Code 2:

rna = input("Enter DNA type: ")

rna = rna.lower()

print(rna)

if rna == "m" or rna == "t" or rna == "r":

   print("valid")

else:

<em>    print("invalid")</em>

<em />

  1. prompts and Takes a single character input
  2. converts the character to lower case
  3. compares the input to the RNA types
  4. Prints "valid" for a valid input else prints "invalid"

Code 3:

Answer 3:

dnaSquence = input("Enter the DNA sequence: ")

type = "valid"

for char in dnaSquence:

   if char not in ["A", "C", "G", "T"]:

       type = "invalid"

       break

print(type)

  1. It prompts for a DNA sequence.
  2. Declares a string variable "type" and initializes type to valid.
  3. The FOR loop checks every character in the DNA sequence.
  4. If the character is not in the list [A, C, G, T] type becomes invalid and the loop breaks and the type "invalid" is printed to the screen.
  5. if all the characters are in the list, then type will remain valid and will be printed to the screen.

Code 4:

rnaSquence = input("Enter the RNA sequence: ")

type = "valid"

for char in rnaSquence:

   if char not in ["A", "C", "G", "U"]:

       type = "invalid"

       break

print("valid")

  1. It prompts for a RNA sequence.
  2. Declares a string variable "type" and initializes type to valid.
  3. The FOR loop checks every character in the RNA sequence.
  4. If the character is not in the list [A, C, G, U] type becomes invalid and the loop breaks and the type "invalid" is printed to the screen.
  5. if all the characters are in the list, then type will remain valid and will be printed to the screen.

7 0
3 years ago
Help with computer. homework
drek231 [11]
Im pretty sure the answer would be 82 because it's concatenating 2 to string(y)
8 0
3 years ago
Other questions:
  • I need help please <br> just plug in the words with their definitions.......
    10·2 answers
  • What does a graphic organizer do
    6·1 answer
  • How much do taxis coast?
    14·2 answers
  • Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
    14·1 answer
  • The vertical and horizontal scroll bars can be used to aid in navigation throughout the document. true or false
    7·2 answers
  • Create another method: getFactorial(int num) that calculates a Product of same numbers, that Sum does for summing them up. (1,2,
    7·1 answer
  • Cryptocurrencies are digital tokens that are created independently of government money, and can act as a medium of exchange and
    15·1 answer
  • What is the difference between spyware and adware?
    8·2 answers
  • Help ASAP please This is a skills lab simulation for college, it’s on Microsoft word is there a keyboard shortcut or something o
    12·1 answer
  • How do you flatten a 2D array to become a 1D array in Java?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!