Question: (a) i) Netstat (Network Statistics) is a command-line network utility tool that displays network connections for the Transmission Control Protocol (both incoming and outgoing), routing

(a)

i) Netstat (Network Statistics) is a command-line network utility tool that displays network connections for the Transmission Control Protocol (both incoming and outgoing), routing tables, and the number of network interfaces and network protocol statistics. How would you use Netstat, and the information, to determine if you are actively being compromised?

[4 marks]

ii) What is MITM attack? Using a diagram explain MITM attack and suggest how they can be prevented.

[6 marks]

iii) What is the name of the bill (a proposal for a new law) introduced in the United Kingdom in 2021 that will allow the government to ban universal default passwords, force firms to be transparent to customers about what they are doing to fix security flaws in connectable products, and create a better public reporting system for vulnerabilities found in those products?

[1 mark]

(b)

i) Threat modelling is the process of identifying threats to a data-tier application and then classify and rate the threats that have been discovered in order to determine the most critical to address.

List the six steps for threat modelling.

[6 marks]

ii) Chris receives a message that his clients cannot research the company's website. Upon investigation he discovers that the router responsible for directing traffic to the web server is receiving an alarming amount of malformed ICMP (Internet Control Message Protocol) requests per second.

What type of attack is the company currently victim of? In order to analyse the attack clearly state three actions required by the security team to respond to the network incident.

[4 marks]

iii) Access controls are a collection of mechanisms that work together to protect the assets of the enterprise. Give four examples of what access control enables management to do.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!