1. Network traffic analysis shows that a single host opening hundreds of SSH
sessions to a single host every minute.
A: Because the host is trying to open so many sessions to the other host the first
thing that comes to mind is a denial of service (DOS) a
Questions for Unit 1
1. Explain the Morris Worm and its significance?
The Morris Worm is credited as the first computer worm spread via the
2. Explain what White-Hat, Black-Hat and Grey-Hat hackers are.
White Hat hackers are the good guys- the h
The following is a report on the various IT vulnerabilities that we have observed
while working with Aim Higher College. College Management has requested this report
to identify the major vulnerabilities associated with its network and the best methods to
We were recently made aware that the student network was running really slow.
It would take a long time for computers to respond to minor things such as opening a
web browser. Upon further investigation we found that a large portion of the computers
Scanning ports for vulnerabilities is often an effective way to conduct an attack on
a particular network. After conducting a vulnerability scan on a specific IP address
located within our network we have found that a variety of ports are open at this tim
To gather information about the schools systems the first thing I would do is to
visit the schools website. In the cause of our school I would visit the main websi
I was assigned the task of reviewing top malware threats reported by the McAfee
Anti-Virus Corporation. The purpose of investigation reporting is to understand the
typical lifecycle of new malware and how the threat presented by malware can change
The virus I chose from the recent threats list on the Mcafee page is known as
Generic PUP .x!24A3C393E0E9. This software is not a Trojan; it is classified as a
potentially unwanted program (PUP). A PUP is not necessarily a virus and do