StunningKate
Oct 17, 2013, 07:37 AM
My teacher wanted everyone in my class to come up with at least 7 simple questions of their own that he’ll look over and pick one from. But we must ask at least 2 people that are not in our class to answer our questions and rate them as easy, moderate or difficult. But the thing is everyone that I ask says my questions are to hard which I kind of don’t think they are. But since I don’t know any people in the IT field other then classmates I figure why not just ask someone online for their input. If you like my questions and can answer them please respond. Your opinions and answers can be brief. My 7 questions are below. Thanks.
1.Given the types of malware, what are the implications for the threat actor to use the different types of malware, compare and contrast at least two different vectors?
2.Compare and contrast the value of DNS cache poisoning versus man-in-the-middle attacks. What is the value and the vector considerations for each one?
3.What is the true value of a vulnerability assessment to an organization?
4. Why is a mantrap the "perfect" security control and what implications that should have on other security controls?
5.Given a router, firewall, internal network, and application server that faces the Internet (i.e. internet accessible), describe the architecture you would develop to properly security the internal network.
Enumerate each data flow you would allow?
6.Given the preponderance of advanced attacks (i.e. zero day or 1st day attacks) against networks, what value does security play in the grander scheme. How can security be effective if the attacks are always ahead of the defenders.
1.Given the types of malware, what are the implications for the threat actor to use the different types of malware, compare and contrast at least two different vectors?
2.Compare and contrast the value of DNS cache poisoning versus man-in-the-middle attacks. What is the value and the vector considerations for each one?
3.What is the true value of a vulnerability assessment to an organization?
4. Why is a mantrap the "perfect" security control and what implications that should have on other security controls?
5.Given a router, firewall, internal network, and application server that faces the Internet (i.e. internet accessible), describe the architecture you would develop to properly security the internal network.
Enumerate each data flow you would allow?
6.Given the preponderance of advanced attacks (i.e. zero day or 1st day attacks) against networks, what value does security play in the grander scheme. How can security be effective if the attacks are always ahead of the defenders.