讲解:IY2840、Threat Detection、R、R Statistics、、|

IY2840 – Coursework 1: Threat Detection and CoreConcepts in Computer SecurityDeadline: 27th Feb 2020. Each sub-question is worth 10 marks (out of 100). This is anblind submission, and submissions are to be made in PDF format on Moodle. This courseworkcounts for 10% of your grade on this module. Learning outcomes assessed are:• Understanding of fundamental security concepts and independent problem solving.• Understanding of application security, and how to assess vulnerabilities.• Understanding of threat modelling and security justifications.DescriptionThis coursework is aimed to have you reflect on the fundamentals of computer security. To getstarted, it is important to review the lecture material, the course text, but also to investigateonline. We are not after essays in this coursework. We are after concise and succinct responsesto each question, e.g.: use bulletpoints and sketches where appropriate. We expect a verygood submission to be less than 5 pages in length. Do share useful resources that you findwith others on the Moodle forum, but do not give any answers away. Note: All the workyou submit must be solely your own work. Submissions are routinely checked forplagiarism.Questions1. Question 1: Vulnerabilities, Exploits and Attacks(a) Investigate the Stuxnet case that was discussed in lecture. Calculate the StuxnetCVSS 3.1 base score (5 marks). Justify your assumptions and show yourcalculations (5 marks). You can use the CVSS 3.1 calculator https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator to check that your results are correct.(b) Assume that you are a SOC analyst working for a company with the industrial controllersthat are vulnerable to the Stuxnet exploit. Outline how the temporalscore is likely to change over time (5 marks) – assuming a patch is and isn’tmade available. What courses of action should you take in light of this?Justify your answer (5 marks).(c) Now, assume you are a SOC analyst working for a bank. They mainly use Linuxand Windows, but no Siemens industrial controllers. Outline how this impactsthe environmental score of Stuxnet for both organisations (5 marks perorganisation).(d) “Shell shock” (CVE-2014-6271) and “Heart bleed” (CVE-2014-0160) are two widelyknownvulnerabilities that took the security community by surprise in 2014. Reflecton the two vulnerabilities for the same aforementioned bank scenario. Outline thekey actions you should take to combat attacks seeking to exploit thosevulnerabilities (5 marks). Create an attack treIY2840留学生作业代做、代写Threat Detection作业、代写R语言作业、R编程设计作业调试 代写留学生 Se that makes use of the twovulnerabilities (5 marks). Make sure to describe AND/OR relationships in thetree.1(e) Compare and contrast CVE, CVSS and ATT&CK as a table and reviewtheir advantages and limitations. (5 marks) Justify how you might use allof them (5 marks) in the aforementioned bank scenario to improve your organisation’soverall security posture.2. Question 2: Threat Detection(a) It is often difficult to predict and determine real-world harms that arise from an attackalerted in IDSs. Outline why this is the case (5 marks)? Justify your answerand provide two concrete examples (5 marks).(b) The following convention for misuse detection is for use in an intrusion detectionsystem. A misuse rule R is formed using the following notation:alert, activity, source -> target, payload of interestwhere an alert is generated if a packet or syscall is detected, originating from a sourcewhich might be a process or a machine, targeting a specific process or machine, carryinga specific payload. To be valid, a rule must instantiate all of the fields. You mustpresent five rules, each rule must be fully described in terms of what kindsof intrusion it is intended to catch and why the rule will work (2 marks perrule). You may use groups and lists. (Hint: you can use the SNORT documentationfor inspiration here, but note that you ought to be original and technically creative.)(c) In lectures we discussed the CIA triad. One of the aspects of a system that we wish toprotect is its availability. Investigate the concept of a Distributed Denial of Service.Briefly explain how DDoS attacks are conducted (3 marks); provide anexample vulnerability and weakness an attacker might exploit to recruitmore bots (3 marks); and outline potential harms (2 marks); Identify apotential false-positive and false-negative threat detection issues that mayappear during a DDoS in threat detection (2 marks)?(d) Outline how an attacker might plan (5 marks) for, and execute a DDoS attackfrom a single Command and Control machine. The DDoS should be executed onceenough bots have been recruited. State your assumptions and create an attacktree (5 marks) (note: make sure to include recruitment and execution of the attack).(e) With the previous sub-question in mind and after conducting research online: Proposea defence strategy for DDoS attacks: how you can make your organisationmore robust against DDoS attacks (5 marks)? Propose a strategyto benchmark your defences (5 marks)?JH February 20202转自:http://www.6daixie.com/contents/18/4930.html

©著作权归作者所有,转载或内容合作请联系作者
  • 序言:七十年代末,一起剥皮案震惊了整个滨河市,随后出现的几起案子,更是在滨河造成了极大的恐慌,老刑警刘岩,带你破解...
    沈念sama阅读 222,252评论 6 516
  • 序言:滨河连续发生了三起死亡事件,死亡现场离奇诡异,居然都是意外死亡,警方通过查阅死者的电脑和手机,发现死者居然都...
    沈念sama阅读 94,886评论 3 399
  • 文/潘晓璐 我一进店门,熙熙楼的掌柜王于贵愁眉苦脸地迎上来,“玉大人,你说我怎么就摊上这事。” “怎么了?”我有些...
    开封第一讲书人阅读 168,814评论 0 361
  • 文/不坏的土叔 我叫张陵,是天一观的道长。 经常有香客问我,道长,这世上最难降的妖魔是什么? 我笑而不...
    开封第一讲书人阅读 59,869评论 1 299
  • 正文 为了忘掉前任,我火速办了婚礼,结果婚礼上,老公的妹妹穿的比我还像新娘。我一直安慰自己,他们只是感情好,可当我...
    茶点故事阅读 68,888评论 6 398
  • 文/花漫 我一把揭开白布。 她就那样静静地躺着,像睡着了一般。 火红的嫁衣衬着肌肤如雪。 梳的纹丝不乱的头发上,一...
    开封第一讲书人阅读 52,475评论 1 312
  • 那天,我揣着相机与录音,去河边找鬼。 笑死,一个胖子当着我的面吹牛,可吹牛的内容都是我干的。 我是一名探鬼主播,决...
    沈念sama阅读 41,010评论 3 422
  • 文/苍兰香墨 我猛地睁开眼,长吁一口气:“原来是场噩梦啊……” “哼!你这毒妇竟也来了?” 一声冷哼从身侧响起,我...
    开封第一讲书人阅读 39,924评论 0 277
  • 序言:老挝万荣一对情侣失踪,失踪者是张志新(化名)和其女友刘颖,没想到半个月后,有当地人在树林里发现了一具尸体,经...
    沈念sama阅读 46,469评论 1 319
  • 正文 独居荒郊野岭守林人离奇死亡,尸身上长有42处带血的脓包…… 初始之章·张勋 以下内容为张勋视角 年9月15日...
    茶点故事阅读 38,552评论 3 342
  • 正文 我和宋清朗相恋三年,在试婚纱的时候发现自己被绿了。 大学时的朋友给我发了我未婚夫和他白月光在一起吃饭的照片。...
    茶点故事阅读 40,680评论 1 353
  • 序言:一个原本活蹦乱跳的男人离奇死亡,死状恐怖,灵堂内的尸体忽然破棺而出,到底是诈尸还是另有隐情,我是刑警宁泽,带...
    沈念sama阅读 36,362评论 5 351
  • 正文 年R本政府宣布,位于F岛的核电站,受9级特大地震影响,放射性物质发生泄漏。R本人自食恶果不足惜,却给世界环境...
    茶点故事阅读 42,037评论 3 335
  • 文/蒙蒙 一、第九天 我趴在偏房一处隐蔽的房顶上张望。 院中可真热闹,春花似锦、人声如沸。这庄子的主人今日做“春日...
    开封第一讲书人阅读 32,519评论 0 25
  • 文/苍兰香墨 我抬头看了看天上的太阳。三九已至,却和暖如春,着一层夹袄步出监牢的瞬间,已是汗流浃背。 一阵脚步声响...
    开封第一讲书人阅读 33,621评论 1 274
  • 我被黑心中介骗来泰国打工, 没想到刚下飞机就差点儿被人妖公主榨干…… 1. 我叫王不留,地道东北人。 一个月前我还...
    沈念sama阅读 49,099评论 3 378
  • 正文 我出身青楼,却偏偏与公主长得像,于是被迫代替她去往敌国和亲。 传闻我的和亲对象是个残疾皇子,可洞房花烛夜当晚...
    茶点故事阅读 45,691评论 2 361

推荐阅读更多精彩内容

  • By clicking to agree to this Schedule 2, which is hereby ...
    qaz0622阅读 1,462评论 0 2
  • 语文老师说:宁愿错过 也不将就 数学老师说:过程错了 结果也就错了 地理老师说:世界那么大 遇见也不容易 历史老师...
    雪山胡杨阅读 975评论 0 0
  • 做个好女人好难! 老公半夜回来,想等他回来陪陪他和他说说话,结果他半夜一点回家,吃了...
    紫雨荷阅读 200评论 0 1
  • 听过这样一个故事: 有一对很恩爱摆地摊的夫妻,到中午饭点时,男人过来跟妻子送饭,在两人很开心的坐在台阶上吃饭的时候...
    胜利一号阅读 513评论 1 4
  • 主路靠右——窗外的叶子还衔着过去的坡度红绿灯路口直行——烟雾放慢脚步讨论冰岛的七月300米处有违法拍照——不分年纪...
    小者阅读 201评论 0 3