Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

need an answer for question 2 1) Using the list of cyber security news websites provide in lecture 1 (or if you have other favorite

need an answer for question 2

1) Using the list of cyber security news websites provide in lecture 1 (or if you have other favorite cyber security news websites, use that, too), summarize the contents of one of the article and provide your thoughts on the article. Where possible, try to fit this into industry trends or its relation to world events or drawing from personal experience where you may have encountered similar issues during your internships/full-time jobs, etc. Answer - 1.) Cyber security news website that can be considered here will be the hacker news. one of his article was regarding the ransomware attack and how it is executed and we will be discussing about it. These files cannot automatically execute on your machine so in order to trick the user to click on the file in order to execute them these ransomware files are oftenly attached which some kind of software and when we click on the software to install or run this files also gets executed and military level encryption which is why it is very difficult to to decrypt the data without having the key and after encrypting all the data it changes our wallpaper we the information page demanding us with the money in order to decrypt the data. If we don't provide the hacker with the money all our data is lost. 2) Research and summarize your findings for how containers & serverless computing is poised to/currently is changing the attack surface for hackers and network defenders. What effect is this having on potential forensic artifacts that would exist when an attack compromises a system? What is fueling the trend to move towards contains and serverless computing platforms like Docker? The summary and your thoughts should be, at minimum, 4 sentences for each question and should include citations as appropriate. Please use crisp, grammatically correct prose as I will dock points otherwise. I realize some of you may think this is unfair, but as almost all of you noted in the last post, communication skills are key in this field and that includes written communication as well, so consider this practice that will pay dividends in the future. Please provide citations as appropriate.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Design Query Formulation And Administration Using Oracle And PostgreSQL

Authors: Michael Mannino

8th Edition

1948426951, 978-1948426954

More Books

Students also viewed these Databases questions

Question

What are Decision Trees?

Answered: 1 week ago

Question

What is meant by the Term Glass Ceiling?

Answered: 1 week ago