answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vichka [17]
2 years ago
10

Fullsoft, Inc. is a software development company based in New York City. Fullsoft’s software product development code is kept co

nfidential in an effort to safeguard the company’s competitive advantage in the marketplace. Fullsoft recently experienced a malware attack; as a result, proprietary information seems to have been leaked. The company is now in the process of recovering from this breach.
You are a security professional who reports into Fullsoft’s infrastructure operations team. The Chief Technology Officer asks you and your colleagues to participate in a team meeting to discuss the incident and its potential impact on the company.
Tasks
Prepare for the meeting by deliberating on the following questions:
• How would you assess the risks, threats, and/or vulnerabilities that may have allowed this
incident to occur, or could allow a similar incident to occur in the future?
• What insights about risks, threats, and/or vulnerabilities can you glean from reports of similar
incidents that have occurred in other organizations?
• What potential outcomes should the company anticipate as a result of the malware attack and
possible exposure of intellectual property?
• Which countermeasures would you recommend the company implement to detect current
vulnerabilities, respond to the effects of this and other successful attacks, and prevent future
incidents?
Computers and Technology
1 answer:
vfiekz [6]2 years ago
6 0

Answer:

Explanation is given below

Explanation:

A set of instructions runs on a system to do some actions that an attacker wants to do without the owners informed consent. It may be in the form of a virus, Backdoor, Trojan Horse, Rootkit, Scareware, Adware, and Worm.

1. This incident may occur due to:

sharing the file folders using USB's

propagation of e-mails

fake ant viruses

fake codec

through your browser

visiting infected web sites

installing infected software's and so on.

2. The worst that could occur with this incident are:

keylogger: software that can capture and record user keystrokes

backdoor: hidden method for bypassing normal computer authentication systems

zombie: computer attached to the Internet that has been compromised

denial-of-service attack (DoS attack): attempt to make a computer resource unavailable

3.

It steals the personal information such as email addresses, phone numbers, bank account numbers and so on.

It deletes or modifies the files.

Steals the software serial numbers and use our computers as relay.

4.

Usage of up-to-date antivirus which continuously analyze the behavior of your system.

Build a perfect malware detector

analyze program behavior

detect changes by using checksum methods

do the sandbox analysis.

change your passwords as you change your underwear.

Do not open unexpected e-mail attachments

Be wary of pop-up windows that ask you to install something (like anti-virus software) if you are just surfing the web.

Keep your system up-to-date. Newer systems automatically update.

firewall: software which inspects network traffic passing through it, and denies or permits passage based on a set of rules.

5. Outline of key points:

Circumstances related to Malware.

Insights about risks, threats, and/or vulnerabilities

Potential outcomes and possible exposure of intellectual property

countermeasures to detect vulnerabilities

You might be interested in
Exercise 4: Bring in program grades.cpp and grades.txt from the Lab 10 folder. Fill in the code in bold so that the data is prop
Alex73 [517]

Answer:

Here is the C++ program:

#include <fstream>  //to create, write and read a file

#include <iostream>  // to use input output functions

using namespace std;  //to access objects like cin cout

const int MAXNAME = 20;  //MAXNAME is set to 20 as a constant

int main(){  //start of main() function

ifstream inData;  //creates an object of ifstream class

inData.open("grades.txt");  //uses that object to access and opens the text file using open() method

char name[MAXNAME + 1];   // holds the names

float average;   //stores the average

inData.get(name,MAXNAME+1);  //Extracts names characters from the file and stores them as a c-string until MAXNAME+1 characters have been extracted

while (inData){  //iterates through the file

 inData >> average;  //reads averages from file using the stream extraction operator

 cout << name << " has a(n) " << average << " average." << endl; //prints the names along with their averages

 inData.ignore(50,'\n');  //ignores 50 characters and resumes when  new line character is reached. It is used to clear characters from input buffer

 inData.get(name,MAXNAME+1);}  //keeps extracting names from file

return 0; }

Explanation:  

The program is well explained in the comments added to each line of the code. The program uses fstream object inData to access the grades.txt file. It gets and extracts the contents of the file using get() method, reads and extracts averages from file using the stream extraction operator. Then program displays the names along with their averages from grades.txt on output screen.

The grades.txt file, program and its output is attached.

3 0
2 years ago
I think you have been doing a great job but you haven’t been signing many people up for our new service feature I want you to se
STatiana [176]

Answer:

24 customers

Explanation:

Given

Customers = 96

p = 25\% --- proportion to sign up

Required

The number of customers to sign up

This is calculated as:

n = p * Customers

So, we have:

n = 25\% * 96

n = 24

5 0
2 years ago
Choose the correct function to convert the user’s response to the number 3.5. &gt;&gt;&gt; answer = input("How much does the sam
FromTheMoon [43]

Answer:

The answer to the given question is given bellow in the explanation section:

Explanation:

<p>This is python code</p>

<p>In python when you enter input into the input function as given:</p>

<code> answer = input("How much does the sample weigh in grams? ") </code>

I will be taken as string.

So I have to convert this string to number format here the given data is float value i-e 3.5

so let convert it. using float function.

<code> answer = float (input("How much does the sample weigh in grams? ") )  </code>

6 0
1 year ago
Read 2 more answers
In the process of retrieving a specific memory from a web of associations a person needs to activate one of the strands that lea
iVinArrow [24]

Answer:

Priming.

Explanation:

The brain is the centre of control for all animals. It coordinates the body system, breathing, beating of the heart, memory, gait, speech, sight etc.

Memory is stored in the brain ( the function of the cerebral cortex in the cerebrum). Two types of memory are the long term and the short term memory. The long term memory stores information permanently in the brain, while the short term holds the information for a while and either transfers it to the long term memory or the memory decays.

To retrieve a specific memory from the wide memory of the brain, it activates a strand that leads to the memory, this process is called priming.

6 0
2 years ago
RADIAC instruments that operate on the ionization principle are broken down into three main categories based on what?
mash [69]

Answer:

Electrical potential.

Explanation:

RADIAC Meter or instruments ( also known as radiation monitoring instruments) are measuring instruments that uses the principles of gaseous ionisation to conduct electricity flow internally to deflect the pointer for its Meter readings. These instruments can be analogue or digital.

They are used in industries to monitor the operation of certain equipments and processes. The level of electrical potential flow in the system determines the state or category of the instrument. Out of six, there are three main categories of electrical potential level.

6 0
2 years ago
Other questions:
  • When ____ is pressed after entering an email address or web address, word automatically formats the address as a hyperlink, that
    15·2 answers
  • Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trai
    9·1 answer
  • You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember there
    15·1 answer
  • A company wants to publish Knowledge articles to its Customer Community. The articles should be organized for easy navigation by
    6·1 answer
  • Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key sh
    10·1 answer
  • PYTHON CODE ONLY:
    7·1 answer
  • When you add a zero to the right of a decimal number, it multiplies its value by 10 (For example, "15" becomes "150"). What simi
    10·1 answer
  • Choose the reasons why Windows Server operating systems are a popular choice for a network because they _____. Select all that a
    12·1 answer
  • 2. BIOS is contained in ROM and not in RAM. Can you guess why?​
    15·1 answer
  • daniel wants to buy a computer to use for playing games after work. he loves racing games and wants to make sure his device has
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!