Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

(a) i) Netstat (Network Statistics) is a command-line network utility tool that displays network connections for the Transmission Control Protocol (both incoming and outgoing), routing

(a)

i) Netstat (Network Statistics) is a command-line network utility tool that displays network connections for the Transmission Control Protocol (both incoming and outgoing), routing tables, and the number of network interfaces and network protocol statistics. How would you use Netstat, and the information, to determine if you are actively being compromised?

[4 marks]

ii) What is MITM attack? Using a diagram explain MITM attack and suggest how they can be prevented.

[6 marks]

iii) What is the name of the bill (a proposal for a new law) introduced in the United Kingdom in 2021 that will allow the government to ban universal default passwords, force firms to be transparent to customers about what they are doing to fix security flaws in connectable products, and create a better public reporting system for vulnerabilities found in those products?

[1 mark]

(b)

i) Threat modelling is the process of identifying threats to a data-tier application and then classify and rate the threats that have been discovered in order to determine the most critical to address.

List the six steps for threat modelling.

[6 marks]

ii) Chris receives a message that his clients cannot research the company's website. Upon investigation he discovers that the router responsible for directing traffic to the web server is receiving an alarming amount of malformed ICMP (Internet Control Message Protocol) requests per second.

What type of attack is the company currently victim of? In order to analyse the attack clearly state three actions required by the security team to respond to the network incident.

[4 marks]

iii) Access controls are a collection of mechanisms that work together to protect the assets of the enterprise. Give four examples of what access control enables management to do.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Development For Dummies

Authors: Allen G. Taylor

1st Edition

978-0764507526

More Books

Students also viewed these Databases questions

Question

=+Where do you want to live and work?

Answered: 1 week ago

Question

=+1 Where are the best places in the world to live (and work)?

Answered: 1 week ago

Question

=+Are you interested in working on global teams?

Answered: 1 week ago