The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
I need this ASAP please. Good grammar and good research like last time. Scholarly sources are welcomed and most of all, NO PLAGIARISM
Please provide a detailed answer and use good research skills. BOTH ANSWERS SHOULD BE 1.5-2PAGES LONG3.3 Gimmiv.A Analysis: Read the analysis at the links below:h±p://www.microsof.com/technet/security/Bulle²n/MS08-067.mspxh±p://blog.threatexpert.com/2008/10/gimmiva-exploits-zero-day-vulnerability.html Ques²on 3 [20%]The threat expert links above describes Gimmiv.a as: “….it could technically be classiFed as a network-aware trojan that employs ³unc²onality o³ a typical RPC DCOM network-aware worm to a±ack otherhosts in the network.” Describe your interpreta²on o³ the above quote. ´ocus on the behavior andexplain how the code could impact a network. Explain in a ³ew paragraphs what speciFc techniquesyou may use to detect the above threat caused by Gimmiv.a. What snort rule(s) should you use toprevent (or detect) the above threat? You will have to do research to explain your answers suµciently.Ques²on4 [10%] You learned a covert channel in Week 6. Do you think IDS like Snort can easily detect a covertchannel? ´or example, can you write an e¶ec²ve set o³ Snort rules to prevent any in³orma²on leakthrough a covert channel? Explain your answer in detail and support your answer with research anddocumenta²on
Attachments: