1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vichka [17]
4 years ago
10

Fullsoft, Inc. is a software development company based in New York City. Fullsoft’s software product development code is kept co

nfidential in an effort to safeguard the company’s competitive advantage in the marketplace. Fullsoft recently experienced a malware attack; as a result, proprietary information seems to have been leaked. The company is now in the process of recovering from this breach.
You are a security professional who reports into Fullsoft’s infrastructure operations team. The Chief Technology Officer asks you and your colleagues to participate in a team meeting to discuss the incident and its potential impact on the company.
Tasks
Prepare for the meeting by deliberating on the following questions:
• How would you assess the risks, threats, and/or vulnerabilities that may have allowed this
incident to occur, or could allow a similar incident to occur in the future?
• What insights about risks, threats, and/or vulnerabilities can you glean from reports of similar
incidents that have occurred in other organizations?
• What potential outcomes should the company anticipate as a result of the malware attack and
possible exposure of intellectual property?
• Which countermeasures would you recommend the company implement to detect current
vulnerabilities, respond to the effects of this and other successful attacks, and prevent future
incidents?
Computers and Technology
1 answer:
vfiekz [6]4 years ago
6 0

Answer:

Explanation is given below

Explanation:

A set of instructions runs on a system to do some actions that an attacker wants to do without the owners informed consent. It may be in the form of a virus, Backdoor, Trojan Horse, Rootkit, Scareware, Adware, and Worm.

1. This incident may occur due to:

sharing the file folders using USB's

propagation of e-mails

fake ant viruses

fake codec

through your browser

visiting infected web sites

installing infected software's and so on.

2. The worst that could occur with this incident are:

keylogger: software that can capture and record user keystrokes

backdoor: hidden method for bypassing normal computer authentication systems

zombie: computer attached to the Internet that has been compromised

denial-of-service attack (DoS attack): attempt to make a computer resource unavailable

3.

It steals the personal information such as email addresses, phone numbers, bank account numbers and so on.

It deletes or modifies the files.

Steals the software serial numbers and use our computers as relay.

4.

Usage of up-to-date antivirus which continuously analyze the behavior of your system.

Build a perfect malware detector

analyze program behavior

detect changes by using checksum methods

do the sandbox analysis.

change your passwords as you change your underwear.

Do not open unexpected e-mail attachments

Be wary of pop-up windows that ask you to install something (like anti-virus software) if you are just surfing the web.

Keep your system up-to-date. Newer systems automatically update.

firewall: software which inspects network traffic passing through it, and denies or permits passage based on a set of rules.

5. Outline of key points:

Circumstances related to Malware.

Insights about risks, threats, and/or vulnerabilities

Potential outcomes and possible exposure of intellectual property

countermeasures to detect vulnerabilities

You might be interested in
You recently started working part-time in a retail store, and are learning about the reading devices your store uses. Your store
Pachacha [2.7K]

Answer:

Laser beams

Explanation:

The laser beams technology is being used by bar code reader.

5 0
3 years ago
Sequential codes may be used to represent complex items or events involving two or more pieces of related data.
katrin2010 [14]

Answer:

The answer is "Option B".

Explanation:

Sequential codes are modules that work toward the solution of a problem that is arranged in a serialized manner. It is also known as serial codes, It is code in which the following two digits differ by a single digit in the binary representation.

  • It helps to decide, which task and how long it will take.
  • It uses communication to provide synchronized and shares resources between tasks.
4 0
3 years ago
After Daniel performed poorly on a test, his teacher advised him to do some self-reflection to figure out how he could get a bet
Free_Kalibri [48]

Daniel gives more and more time to self-reflection and improves the mistakes he was doing in the last exam.

<h3 /><h3>What is self-refelection?</h3>

Reflecting on oneself is similar to gazing in a mirror and reporting what you see. It is a method of evaluating your work habits, study style, and self. To think about something is the definition of reflection, given simply.

When Daniel didn't do well on an exam, his teacher suggested that he think about his performance to see how he may perform better on the upcoming test.

Examine the material he is familiar with. Consider whether he needs to change his study strategy. Request extra assistance from the instructor outside of class.

Examine the questions he didn't get right and consider why. Self-reflection is the process of assessing one's performance to identify any problem areas that require improvement.

Hence, daniel gives more and more time to self-reflection and improves the mistakes he was doing in the last exam.

To learn more about self-reflection refer;

brainly.com/question/14754364

#SPJ1

5 0
2 years ago
6.5 Code Practice: Question 1
vaieri [72.5K]

Answer:

# input the number of temperatures required, which will be 10 here, but the user can print any number.

n=input("Enter the number of temperatures you want")

# create a list which can have n temperatures since it starts from 0, the maximum is n-1, and n needs to be converted to an integer.

temp= [0,int(n)-1]

#declared a variable of float type. As its 0.0 it will be a float, if 0 then integers, and so on

s=0.0

#running a for loop n times, and hence 0 to n-1.

for i in range(0, int(n)):

temp[i]=input("Enter the temperature in degree celsius in float")

s=s + float(temp[i])

i=i+1

print("The sum of the temperatures is:{0:0.1f}", +s)

Explanation:

The question from edhesive is: You need to write a program that calls for ten temperatures and then find the sum of temperatures. The temperature should be in float, which is expected. And the program is as being mentioned in the answer section.

4 0
3 years ago
Read 2 more answers
List and describe three options in the autocad object snap toolbar
miv72 [106K]
<span>END POINT : Snaps to the closest endpoint or corner of a geometric object. MID POINT : Snaps to the midpoint of a geometric object. CENTER : Snaps to the center of an arc, circle, ellipse, or elliptical arc.</span>
6 0
3 years ago
Other questions:
  • Which is the last step in conducting a url research
    11·1 answer
  • Manuel is working on a project in Visual Studio. He wants to keep this program showing on the entire desktop, but he also needs
    7·1 answer
  • Which of the following illustrates an example of a Boolean data type?
    15·1 answer
  • Compute their Cartesian product, AxB of two lists. Each list has no more than 10 numbers.
    5·1 answer
  • What methods would you add to make this class declarationvery useful?
    11·2 answers
  • Presentation graphics programs contain an assortment of tools and operations for creating and editing slides, including preforma
    8·2 answers
  • All of the following are used to fund private schools except ______
    14·2 answers
  • To date, what has most propelled the digital revolution?
    10·1 answer
  • Does anyone have discord
    14·2 answers
  • Tips for staying safe using social media. Using in your own words.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!