Question & Answer: 2. Explain the CIA triad. For each part of the triad, outline attacks on a database and possible protections……

2. Explain the CIA triad. For each part of the triad, outline attacks on a database and possible protections.

3. Choose an application protocol that requires encryption. Describe that protocol in a few sentences and describe how you would attack the protocol.

Don't use plagiarized sources. Get Your Custom Essay on
Question & Answer: 2. Explain the CIA triad. For each part of the triad, outline attacks on a database and possible protections……
GET AN ESSAY WRITTEN FOR YOU FROM AS LOW AS $13/PAGE
Order Essay

5. If you were a malware designer, would you rather use TCP or UDP to distribute a malicious payload and why?

6. What is the TCP triple-handshake and how can it be used in an attack? Which leg of the CIA triad would this attack fall under?

7. Give an example of an Internet worm. What vulnerability does the worm you cited exploit? What were the attack effects of the worm you cited, if any? What is a practical defense against the worm you cited?

8. Give an example of someone who suffered legal repercussions for writing or using malware.

9. What is an APT? What are some practical strategies to protect yourself from an APT?

10. Identify a large business which suffered a loss of business due to a successful malware attack. Was this a targeted attack? Was a perpetrator ever identified?

Expert Answer

Question & Answer: 2. Explain the CIA triad. For each part of the triad, outline attacks on a database and possible protections...... 1

Question & Answer: 2. Explain the CIA triad. For each part of the triad, outline attacks on a database and possible protections...... 2

Still stressed from student homework?
Get quality assistance from academic writers!