Question: Long Answer 1. Bob Bobson is a security analyst for Goldmine Tech. He recently received a tip from a government agency that the nefarious cybercriminal
Long Answer 1. Bob Bobson is a security analyst for Goldmine Tech. He recently received a tip from a government agency that the nefarious cybercriminal Zero Cool has boasted on an underground internet forum that he is actively infiltrating the Goldmine Tech computer network. What intrusion detection measures can he possibly employ to detect Zero Cool's activities? In your opinion, what are the pros and cons of each?
2. In monitoring the network activity between a critical Goldmine Tech web server and an untrusted foreign IP, Bob discovers the following HTTP GET request from the untrusted IP: GET /cgi-bin/status/status.cgi HTTP/1.1 Host: motherlode.goldminetech.edu User-Agent: () { :;}; echo "PWNED by 0c007: $(
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
