You are a network analyst. ArWork, who is your customer, has around 450 employees in their...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
You are a network analyst. ArWork, who is your customer, has around 450 employees in their company. This time, the company came for your advice as their employees have been frustrated with increasing spam emails, its computers also crash frequently, take a long time to start up or shut down. Furthermore, your customer mentioned that the programs are running very slowly. You told your customer that you think some or all of the company's computers might be a part of some botnets. Given your comment, your customer would like to understand how their computers became a part of some botnets as well as how their computers are controlled and manipulated remotely. Your customer has heard about honeypots/honeynets and network separation although does not really understand how they work. Your customer was wondering if the honeypots/honeynets and network separation can be useful to the company in mitigating future attacks. They also want to know if there are other recommendations apart from using honeypots/honeynets and network separation. 1. Botnets: 1.1 What are botnets? What are they use for? How do botnets work? Is being a part of a botnet a bad thing? Why or why not? 1.2 Is it possible that the company's computers are a part of some botnets? And if it is possible, then what are the factors that convinced you that the company's computers are a part of some botnets. Discuss the possible causes. 1.3 Explain how their computers being infected, and hence a part of some botnets (given that is the case). 1.3.1 Explain how the infection spread across the transport layer protocol. 1.3.2 Detailing the infection, propagation and relevant payload. 1.3.3 Provide some examples and a diagram/s illustrating the concept. 1.3.4 What are the effects from the company's computer became a part of botnets? What can the attacker/s employ the infected computer for? And how? 1.3.5 In your opinion, what is the worst-case scenario, and why? 1.3.6 How to fix the problem of the customer's computers from being infected. 2. Honeypots/honeynets and network separation: 2.1 Introduce the concept of honeypots/honeynets and network separation. Why should they be implemented on top of what you have recommended in question 1.3.6? 2.1.1 What sort of information can be gathered through honeypot and honeynets? How many types of honeypots and honeynets are there? 2.1.2 How can you perform network separation? 3. Honeypots/honeynets and network separation for A/Work: 3.1 Make a recommendation, accompanied by appropriate diagrams, on how honeypots and/or honeynets and network separation can be deployed for the organisation. 4. Mitigation Strategies: 4.1 Propose appropriate strategies to the client that should be adopted in the organisation in order to reduce the chances of another attack. 4.2 Make recommendations on what could be done to make the organisation's network a safer place. Explain how encryption such as symmetric and Asymmetric will help in this situation quoting examples. You are a network analyst. ArWork, who is your customer, has around 450 employees in their company. This time, the company came for your advice as their employees have been frustrated with increasing spam emails, its computers also crash frequently, take a long time to start up or shut down. Furthermore, your customer mentioned that the programs are running very slowly. You told your customer that you think some or all of the company's computers might be a part of some botnets. Given your comment, your customer would like to understand how their computers became a part of some botnets as well as how their computers are controlled and manipulated remotely. Your customer has heard about honeypots/honeynets and network separation although does not really understand how they work. Your customer was wondering if the honeypots/honeynets and network separation can be useful to the company in mitigating future attacks. They also want to know if there are other recommendations apart from using honeypots/honeynets and network separation. 1. Botnets: 1.1 What are botnets? What are they use for? How do botnets work? Is being a part of a botnet a bad thing? Why or why not? 1.2 Is it possible that the company's computers are a part of some botnets? And if it is possible, then what are the factors that convinced you that the company's computers are a part of some botnets. Discuss the possible causes. 1.3 Explain how their computers being infected, and hence a part of some botnets (given that is the case). 1.3.1 Explain how the infection spread across the transport layer protocol. 1.3.2 Detailing the infection, propagation and relevant payload. 1.3.3 Provide some examples and a diagram/s illustrating the concept. 1.3.4 What are the effects from the company's computer became a part of botnets? What can the attacker/s employ the infected computer for? And how? 1.3.5 In your opinion, what is the worst-case scenario, and why? 1.3.6 How to fix the problem of the customer's computers from being infected. 2. Honeypots/honeynets and network separation: 2.1 Introduce the concept of honeypots/honeynets and network separation. Why should they be implemented on top of what you have recommended in question 1.3.6? 2.1.1 What sort of information can be gathered through honeypot and honeynets? How many types of honeypots and honeynets are there? 2.1.2 How can you perform network separation? 3. Honeypots/honeynets and network separation for A/Work: 3.1 Make a recommendation, accompanied by appropriate diagrams, on how honeypots and/or honeynets and network separation can be deployed for the organisation. 4. Mitigation Strategies: 4.1 Propose appropriate strategies to the client that should be adopted in the organisation in order to reduce the chances of another attack. 4.2 Make recommendations on what could be done to make the organisation's network a safer place. Explain how encryption such as symmetric and Asymmetric will help in this situation quoting examples.
Expert Answer:
Related Book For
International Marketing And Export Management
ISBN: 9781292016924
8th Edition
Authors: Gerald Albaum , Alexander Josiassen , Edwin Duerr
Posted Date:
Students also viewed these computer network questions
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
The Crazy Eddie fraud may appear smaller and gentler than the massive billion-dollar frauds exposed in recent times, such as Bernie Madoffs Ponzi scheme, frauds in the subprime mortgage market, the...
-
The current quoted price of a 13% coupon bond is $110. It pays coupon semi-annually. The next coupon will be paid in 6-days (total number of days in this semi-annual period is 181) and the futures...
-
A block (mass = 2.0 kg) is hanging from a massless cord that is wrapped around a pulley (moment of inertia = 1.1 x 10-3 kg m2), as the drawing shows. Initially the pulley is prevented from rotating...
-
(a) What age interval contained the most females? (b) What age interval contained the most males? (c) By looking at the graph, can you estimate if there is a significant difference between the ages...
-
The amount of wind power produced through wind turbines steadily increases year after year, at a growth rate of about 25 percent. These wind turbines can be as tall as a twenty story building and...
-
Rachel wants to determine the shipping routes that will minimize Statelines total cost in order to develop a contract proposal to submit to Polychem for waste disposal. She particularly wants to know...
-
The Reading Warehouse distributes hardback books to retail stores and extends credit terms of 2/7, n/30 to all of its customers. During the month of June the following inventory transactions...
-
You have a business based in Vietnam that has just imported a product from Thailand. The invoice for this purchase is denominated in Vietnamese dong and must be paid in 60 days. That is, you will pay...
-
Write and present a historical background of business ethics, and then evaluate and measure the ethical system of Walmart, Amazon and Apple: 1) What each company does? 2) What are the ethical systems...
-
Jan 4 Paid $500.00 rent for the month to Eastwood Mall Inc. Issued cheque #131. Jan 4 Manager advised the rent has increased to $520.00 on new lease. Reverse and correct the previous entry to the...
-
How high is an airplane flying (in feet) if the barometer in the plane is reads 27.23 in Hg. On the ground, the atmospheric pressure is determined to be 29.67 in Hg. The air density is 0.073 lbm/ft....
-
A shot-putter accelerates a 5 kg shot put from rest to 11.2 m/s in a distance of .5 m. Find the following: What is the work done on the shot put? What is the force exerted by the shot-putter? What...
-
two hollows spheres of radii 5 cm and 15 cm has an initial charge of 1uC and 10uC, respectively. if the two spheres touch each other , find the charge remaining on the 5 cm sphere?
-
A 200 kg log is dragged at constant velocity through the forest by a towing vehicle. The towing cable is connected to the log at its end, and the cable makes a 45 degree angle with the ground....
-
Indicate whether the statement is true or false. One requirement for a probability distribution is that the sum of all the events in the sample space must equal 0. A major difference between the...
-
A company produces earbuds. The revenue from the sale of x units of these earbuds is R = 8x. The cost to produce x units of earbuds is C = 3x + 1500. In what interval will the company at least break...
-
Various classification schemes are sometimes used to given an indication of the potential of a foreign market/country. Explain why these schemes should or should not be used as a basis for deciding...
-
Better Way (Thailand) Company Limited was founded in 1988 by Thailands king of direct selling, Dr Amornthep Deerojanawong and Boonyakiat Chokwatana. Dr Amornthep had worked as a medical doctor at...
-
Why might a company not choose outsourcing even when production costs are sufficiently lower?
-
How do you think recessions influence elections?
-
Why does a change in income taxes have a different effect on aggregate supply than a change in government expenditures?
-
Explain how large scale structural change mightinfluence the short-run and long-run Phillips curves.Will the influencecome from changes in the expected inflation rate,the natural unemployment rate,...
Study smarter with the SolutionInn App