留学生考试辅导 Cyber Security Tutorial 3

Cyber Security Tutorial 3
Instructions
In this tutorial you should work preferably in pairs or alone. Try to answer all the questions together and discuss the possible answers/solutions. You will be given 30 minutes to complete this task and, in the end, a general discussion will take place in class based on the content of this tutorial. Try to answer as many questions as youcan!
Question1:Pleasechoosetherightanswerfromthegivenchoicesbyfillinginthegapswherenecessary.

Copyright By PowCoder代写 加微信 powcoder

1) When a group of computers is being used from hackers for malicious activities, we talk about a/an .
• Network Scanning
• Army of hacks
2) When someone has stolen your data, encrypted them and try to extort money; we have a/an attack.
• DDOS (Distributed Denial of Service)
• Ransomware
• Phishing
• Man in the middle
• Identity Theft
3) If you share lots of information about your life on social media, you are exposed to possible
DDOS (Distributed Denial of Service) Ransomware
Man in the middle
Identity Theft
4) When you have received a/an email, it is better to make the IT team aware of this incident.
• DDOS (Distributed Denial of Service)
• Ransomware
• Phishing
• Man in the middle
• Identity Theft
5) ARP Spoofing is one of the most common strategies for a successful attack.
• DDOS (Distributed Denial of Service)
• Ransomware
• Phishing
• Man in themiddle
• Identity Theft

6) Someone can use a Zombie Network in order to employ a/an attack.
• DDOS (Distributed Denial of Service)
• Ransomware
• Phishing
• Man in the middle
• Identity Theft Question 2
Identify and explain the following terms; give some examples if needed; 1) pulsing zombie, 2) shoulder surfing, 3) sandbox, 4) dumpster diving, 5) walled garden.
1) Pulsing zombie;
2) Shoulder surfing;
3) Sandbox;
4) Dumpster diving; general 5) Walled garden;
Question 3
What is spyware and how does it work? Give an example of a well-known spyware.
Question 4
What procedure do you think is the hardest for a malicious entity when he/she initiates a cyber- attack? Discuss between your team the different opinions you might have.
The answer can be so different depending on different perspectives. For example, one of the students in class replied that the biggest challenge is the payload. As it can be so tricky to execute an attack because of complications that might come up due to the different defend mechanisms that might be in place. However, we will go through all steps in detail in class and you can also consider that trying to stay anonymous as an attacker is a huge challenge too. As once an attacker is caught then this is it.
A regular zombie paralyzes a system with a steady stream of attack traffic.
However, the pulsing zombie use irregular small bursts of attack traffic from multiple sources
on a single target over an extended period. These attacks are more difficult to detect and
trace because they are slow and gradual, so they do not immediately appear as malicious.
act of obtaining personal or private information through direct observation.
Looking over a person’s shoulder to gather pertinent information while the victim is unaware.
Binoculars, video cameras and vision-enhancing devices can be used, depending on location
and situation.
testing environment that enables the isolated execution of software or programs for
independent evaluation, monitoring or testing.
searching through trash or garbage looking for something useful.
Trying to uncover useful information that may help an individual get access to a network.
various meanings→quarantining computers prone to attacks, such as
computers showing the symptoms of botnet activity from malware.→restricted environment
in which in order to leave the environment and unauthenticated user should create an
account.→web environment with restrictions to certain content and areas.
Infiltration software that secretly monitors users and enables malicious entities to obtain sensitive
information, such as passwords, from the user’s computer. It exploits user and application
vulnerabilities and is often attached to free online software downloads or to links that are clicked

Question 5
What is DNS poisoning/spoofing? Explain this type of attack and how it can be successfully implemented. What would be considered a good mitigation method?
DNS recursion; the DNS server allows recursive queries for other domains and this means it allows third-party hosts to query the name servers as they want. Regular patching of DNS servers. Use of DNSSEC (DNS System Security Extensions)
protocol using a set of extensions for extra authentication.
Question 6
Use one laptop if possible and try to ping a website you are interested in; by typing in command line “ping ” or use the IP address instead of the website. What are the replies you get? After, completion instead of ping try the tracert command. Explain in both cases the information presented to you.
Pinging the university website externally:
The process of illegitimately modification of DNS records to replace a website address with a
different one. DNS cache poisoning is used to redirect visitors of a website to their defined/desired
website (malicious). Some mitigation: Disable
This means that either the website is down; which is not true or that the provider has disabled external ping requests.
Pinging another website like facebook:
First thing is that the host is running plus we can see the use of IPv6 addresses. T
Default ping requests number for windows is 4;
therefore, you can see 4 replies.
groups of digits represent the network portion of the IPv6 address, while the last four groups
he first four
represent the specific host within that network.

Use of tracert:
Tracert; track the pathway taken by a packet on an IP network from source to destination.
Traceroute also records the time taken for each hop the packet makes during its route to the
destination. In this example you can see how many hops needed to reach facebook’s website.

程序代写 CS代考 加微信: powcoder QQ: 1823890830 Email: powcoder@163.com