Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Background Nowadays, new technologies and features are constantly being introduced to computer system, network and applications. But the changes may introduce additional or new vulnerabilities

image text in transcribed

Background Nowadays, new technologies and features are constantly being introduced to computer system, network and applications. But the changes may introduce additional or new vulnerabilities to the computer systems. If the vulnerabilities are discovered by malicious party, it can be exploited to compromise the security of the computer system. Therefore, it's important for system or network administrator to identify vulnerabilities on their system and understand how it can be exploited by hacker. Once vulnerabilities have been identified, only then administrator can begin to take steps to address and close the vulnerabilities. The Instructions Your assignment is to find and discuss vulnerability on any computer systems (e.g. Android Smartphone, Router, IOT), network protocols (e.g WPA, FTP, HTTP) or applications (Web, Student portal). Then based on the vulnerability, you need to demonstrate a real-case attack (e.g. DOS, Rootkit) which exploit the vulnerability. Finally you need to discuss a mechanism to address the vulnerabilities and prevent attack on such system. The Tasks Your report must comprise of the followings: 1. Explanation on the chosen computer systems / network protocols / applications 2. Discussion on the vulnerabilities which can be exploited 3. Discussion on the mechanism / technique of the attack which exploit the vulnerability. 4. A method or mechanism to address the vulnerability and prevent the attack on the system. 5. The screenshot as prove of implemented system and simulated attack

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

which financial statements report retained earnings?

Answered: 1 week ago

Question

4. Describe cultural differences that influence perception

Answered: 1 week ago