Discuss different famous malware threats specifics of each


Discussion 1: "Scareware and Famous Threats"

Please respond to the following:

1. Determine how scareware has become a serious threat and why you believe end users often fall victim to this form of hoax.

2. From the e-Activity (listed below), discuss the different famous malware threats, the specifics of each threat, how they worked, why they were or weren't successful, and how they were eventually defeated. Compare and contrast the two selected malware threats and explain which you believe was the stronger threat and why.

E-Activity

Use the Internet to research at least two different famous malware threats (e.g., Code Red). Pay close attention to the specifics of each threat, how it worked, why it was or wasn't successful, and how it was eventually defeated.

Discussion 2: "The Trojan Threat"

Please respond to the following:

1. Consider the need for education in protecting against all types of malware. Determine whether or not you believe security departments are properly educating employees on common threats.

2. Determine whether or not you believe bit torrent sharing networks are a breeding ground for Trojan proliferation and if so, suggest what can be done to mitigate the risks. Justify your response.

Discussion 3: "Botnet Defense"

Please respond to the following:

1. Analyze honeypotting to determine if it is an optimal detection method of botnets and justify your answer. As a security director, explain whether or not you would consider implementing a honeypot as a security control and why.

2. From the first e-Activity (listed below), describe the privacy concerns with Internet service provider (ISP) packet detection. Decide whether or not you believe the government should demand ISPs to take more of a proactive approach in detecting and protecting against botnets. Provide a rationale with your response.

E-Activity

Watch the video titled "Assessing the botnet threat" (10 min 52 s), found on the Search Security Website.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Discuss different famous malware threats specifics of each
Reference No:- TGS02390460

Now Priced at $40 (50% Discount)

Recommended (98%)

Rated (4.3/5)