Project Part 1
What threats are new this year, and which have become more prevalent?
Cloud computing attacks: Many companies are switching to Cloud Computing to store
their data to save on data storing expenses. Hackers knows that, and they will be
Adversary Model of Cybercrime
As the technology advanced in the past couple decades, most of the business
are depending on technology to operate and make profit. As a result, cybercrimes
evolved and more businesses are being targeted every ye
Complete the following steps for this assignment:
1. Visit the DShield.org Web sites reports page at
2. Review the Top 10 Ports chart on the page.
a. Port 23 Telnet
b. Port 80 HTTP
c. Port 445 Microsoft-ds
1. What information about university systems is sensitive?
As shown in the diagram the university has its own datacenter. Universitys
datacenter contain a lot sensitive information, information like students
names, addresses, social security
Project Part 3
As indicated by the AVG scan report, the machine is infected by nine malwares. Six of these malwares
are high priority and three of them medium priority. According to the textbook, page 242, malware is a
software that preform any action or
Project Part 2
What ports and services of the system were open, as identified by the Zenmap scan?
23 ports are open:
Port 139: Used by netbios-ss, NetBIOS is a protocol used for File and Print Sharing
under all current versions of Windows. While this in
The Malware I will research is Trojan-Skelky which was discovered by Mcafee on
4/22/2016. Other security centers discovered earlier. Trojan-Skylky can affect almost
any Windows OS such as: (Windows 2000, Windows 7, Windows 95, Windows 98,
1. A type of certificate used to provide security on Web sites.
2. The most common public key encryption system and, in most cases,
relies on manual trust and key distribution.
3. Provides authentication or proves i
How would you determine the universitys Internet Protocol (IP) address range?
o I would login from any computer in the university (it could be in the labs
or library) run the cmd command ipconfig which will return the IP
address for the compu
1. Aim Higher College has deployed an open source blog package. This package
uses a database backend and allows users to create user IDs, sites, and their
own content to post it. Recently, the service has had off-campus users who have
What effect does the vulnerability have on the cryptosystem?
o The attack benefits from a weakness in MD5 cryptographic hashing
function that permits the creation of different messages with the same
MD5 hash which is widely known as an MD5 "c
AVE. Anti‘v’irus Business Edition
(— Reports Detections Archive report
Q) Whole Computer