Chapter_1

Chapter_1 - Chapter 1 A Framework Name: _Tim Simmons_...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 1 A Framework Name: ___________Tim Simmons ______________ E-Mail: ___tim.simmons@us.army.mil ; timothy.simmons@freenet.de Test Your Understanding 2. a) In the Riptech data, how many times is the average firm attacked each year? A: at an annual rate of 1,000 times per year. b) What percent of all firms experienced a highly aggressive attack in the first half of 2002? A: “Twenty-three percent of all firms examined experienced at least one sophisticated aggressive attack in the first 6 months of 2002.” c) Are most attacks targeted at specific firms? A: No, only 39% of all the attacks where directed at specific firms, the rest appeared to be random attacks based on the firm’s IP address range. d) Why are sophisticated aggressive attacks especially dangerous? A: Because of their sophistication, sophisticated aggressive attacks are 26% more likely to cause severe damage to networks and computer systems, than other less sophisticated aggressive attacks. e) In the SecurityFocus data, how many times is the average firm probed each year? A: There was an average of 13,000 network scanning probe packets per firm each year. f) How many times is the average firm’s website attacked each year? A: There was an average of 3,000 website attack packet per firm each year. g) How many times is the average firm subjected to denial-of-service attack packets each year ?
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Chapter 1: Framework A: The average firm was subject to 600 denial- of-service attack packets each year. h) Which operating systems are attacked frequently? A: According to this study all popular operating systems are attacked frequently, although in this study speaks of data that was collected on, Microsoft Windows, UNIX/LINUX, and Cisco’s OS. i) In the Honeynet Project data, how quickly were Windows 98 PCs with open shares and without passwords taken over ? A: According to this project this configuration, which happens to be the common configuration of most home networks it must have not taken the attackers much time at all to compromise. These systems were compromised five times in 4 days. j) Were LINUX PC servers safe from attack? A: No, although it took the attackers longer the Red Hat 6.2 LINUX PC server with default configurations only three days to compromise. 3.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 08/24/2011 for the course ECON 101 taught by Professor Doc during the Spring '11 term at Yale.

Page1 / 5

Chapter_1 - Chapter 1 A Framework Name: _Tim Simmons_...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online