b) Render in an elaborative manner, some defensive measures that one can take to protect host or target computers from malicious computer programs.
b) Enumerate three commensurate defensive measures that can be implemented to mitigate attacks of the nature explained in 4a above.
Three ways an undesired program affects the target computer:
1. Becoming part of an already running program in the target computer:
Usually, a virus program makes use of an already running program on the computer. It uses the program to spread across the computer and then from there on go to another computer.
2. Making copies of themselves:
Similar to viruses is a worm program. It spreads by replicating itself. The worm is a standalone program.
3. Using legitimate codes:
A trojan is something that looks like a legitimate piece of the program. Users often click on it thinking that it is genuine. Once clicked it executes in the system and attacks it.
Defensive measures:
1. Use of trusted programs:
There are many antivirus software and other programs that claim security but are not really secure. There are also free programs that claim to remove viruses from the computer. It is advised to always use registered antivirus from a trusted company.
2. Regular scans:
It is also important to run regular scans on the computer. It helps in monitoring the health of the computer. It is advised to run the monitoring software in the background and manage it from time to time. Setting up regular automatic scans can also do the job. It helps in finding out if there is something wrong with the computer.
3. Operating system updates:
Operating system updates are the best way to keep the computer secure. Operating systems have their own type of scans and antivirus defenses. The updates have to perform regularly though. This is because every time the operating system vendor discovers new vulnerabilities, new security measures are released.
4. Use of secure networks:
Malicious programs usually find their way to the computer through weak network connections. It is advised not to use public wifi and always use encrypted networks. WEP router encryption is also the best way to prevent security breaches.
4a) Three forms of such attacks:
In the mentioned scenario, online services are made unavailable to the host or users. It is done by interrupting the services or suspending them temporarily. There are three forms of such attacks:
Volume-based:
These types of attacks are done using UDP floods and spoofed packets. In many cases, such attacks also include ICMP flooding. The main goal of such attacks is to perform a bandwidth saturation.
Protocol-based:
In such an attack, SYN flooding is used whereas the number of acknowledgments is sent. Fragmented packets and smurf DDoS are other ways to do it. In this attack, all the server resources are consumed.
An application layer-based:
In these attacks, a low and slow approach is used. Most often they target Apache and GET/POST vulnerabilities. The attack often includes innocent requests sent to the server. The requests seem innocent.
Three defensive measures:
1. Create a checklist:
A full checklist of assets should be created. It can be done to make sure that threats can be easily identified, assessed, filtering tools can be used. It helps in enhancing the security of the system. After that, a response plan should be created.
2. Network infrastructure:
The network infrastructure should be secured using multi-layer protection strategies. Content filters, spam deletion, etc. are some of the ways. The devices used in the network should have mitigation strategies implemented in them.
3. Cloud leveraging:
Since the cloud bandwidth is more than traditional ways. It can offer many benefits. It represents a diffuse resource. Apps based on the cloud can easily absorb harmful traffic. Cloud is also worked upon by engineers who know the best security and monitoring measures.
Get Answers For Free
Most questions answered within 1 hours.