代写代考 Cyber Security Tutorial 3

Cyber Security Tutorial 3
Instructions
In this tutorial you should work preferably in pairs or alone. Try to answer all the questions together and discuss the possible answers/solutions. You will be given 30 minutes to complete this task and, in the end, a general discussion will take place in class based on the content of this tutorial. Try to answer as many questions as youcan!
Question1:Pleasechoosetherightanswerfromthegivenchoicesbyfillinginthegapswherenecessary.

Copyright By PowCoder代写 加微信 powcoder

1) Whena group of computers is being used from hackers for malicious activities, we talk about a/an .
• Network Scanning •
• Army of hacks
2) When someone has stolen your data, encrypted them and try to extort money; we have a/an attack.
• DDOS (Distributed Denial of Service)
• Ransomware
• Phishing
• Man in the middle
• Identity Theft
3) If you share lots of information about your life on social media, you are exposed to possible
DDOS (Distributed Denial of Service) Ransomware
Man in the middle
Identity Theft
4) Whenyouhavereceiveda/an email,itisbettertomaketheITteamawareofthisincident.
• DDOS (Distributed Denial of Service)
• Ransomware
• Phishing
• Man in the middle
• Identity Theft
5) ARP Spoofing is one of the most common strategies for a successful attack.
• DDOS (Distributed Denial of Service)
• Ransomware
• Phishing
• Man in the middle
• Identity Theft

6) Someone can use a Zombie Network in order to employ a/an attack.
• DDOS (Distributed Denial of Service)
• Ransomware
• Phishing
• Man in the middle
• Identity Theft
Question 2
Identify and explain the following terms; give some examples if needed; 1) pulsing zombie, 2) shoulder surfing, 3) sandbox, 4) dumpster diving, 5) walled garden.
Question 3
What is spyware and how does it work? Give an example of a well-known spyware.
Question 4
What procedure do you think is the hardest for a malicious entity when he/she initiates a cyber- attack? Discuss between your team the different opinions you might have.
Question 5
What is DNS poisoning/spoofing? Explain this type of attack and how it can be successfully implemented. What would be considered a good mitigation method?
Question 6
Use one laptop if possible and try to ping a website you are interested in; by typing in command line “ping ” or use the IP address instead of the website. What are the replies you get? After, completion instead of ping try the tracert command. Explain in both cases the information presented to you.

程序代写 CS代考 加微信: powcoder QQ: 1823890830 Email: powcoder@163.com