Question

How do exploits relate to vulnerabilities? Using the Internet, find and read the SANS/FBI Top 20...

  1. How do exploits relate to vulnerabilities?
  1. Using the Internet, find and read the SANS/FBI Top 20 Vulnerabilities. Discuss at least 2 of the Top 20. Discuss the threat group, category and potential risks and steps to mitigate the vulnerability.
  1. Jailbreaking your iPhone – is it ethical and/or legal?

    Please answer all these three questions in your own words.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

1.

  • Apache Web Server

Avoid opening up the ports . Use SSL TLSv1.3 certificate for public and private key data transmission between the client and the server.

Use port scanner to scan the ports - Dont use familiar ports like 8080 for TCP use some random ports and keep changing it after every week or month.

Web Server should be always behind a strict firewall that doesn;t allow the world (internet 0.0.0.0/*) allow all rule to access the web server directly instead use reverse proxy server like Nginx for enhanced security. The connections tcp will be dropped when the tcp connections becomes stale.

Use cloudflare or Ddos mitigation tools - Datadog monitoring to analyze sudden traffic spikes or ip flooding attacks etc. Use robots or captcha checker when required.

Try to detect bot traffic or geo location of the client write the rules to give them very limited access.

2. SSH remote access :

Prevent snooping or attacker trying to access remote servers : Create Key pair - putty gen random key generator and pair with the SSH putty authentication .pem pair.

Try to rotate the keys for every 3 or 4 days and access the remote servers using ssh .

Use random ports like 13412, 15821 ,16234 ssh ports to prevent guess kind of attacks.

The threat groups are primarly from china , russia , ukraine and korea. They use advanced reflector kind of attacks.

Add a comment
Know the answer?
Add Answer to:
How do exploits relate to vulnerabilities? Using the Internet, find and read the SANS/FBI Top 20...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • Using the Internet, find a recent case in the news about business fraud (within the last...

    Using the Internet, find a recent case in the news about business fraud (within the last 18 months) that involved systems and/or information breach. Summarize the situation, identify the control issues that were compromised and discuss what could have been done to mitigate the loss. Please refer to the six questions on page 143 related to Case 5-1. Adapt those questions to your case in the news and they will serve as good guidance for your paper. To understand the...

  • Please read the article and answer about questions. You and the Law Business and law are...

    Please read the article and answer about questions. You and the Law Business and law are inseparable. For B-Money, the two predictably merged when he was negotiat- ing a deal for his tracks. At other times, the merger is unpredictable, like when your business faces an unexpected auto accident, product recall, or government regulation change. In either type of situation, when business owners know the law, they can better protect themselves and sometimes even avoid the problems completely. This chapter...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • 2. Case Discussion for INTERNET MARKETING Digital Transformation at Disney World The Disney theme park experience...

    2. Case Discussion for INTERNET MARKETING Digital Transformation at Disney World The Disney theme park experience – whether it is at the Magic Kingdom in Walt Disney World in Orlando, FL or the original Disneyland in Anaheim, CA or one of the newer parks, such as the Shanghai Disney Resort (opening in 2016) – is designed to be an immersive, exciting, and definitely magical experience for guests. Disney famously wants the reality created inside its theme parks to be better...

  • Read the Article posted below, then answer the following questions: 1. As a junior member of...

    Read the Article posted below, then answer the following questions: 1. As a junior member of your company’s committee to explore new markets, you have received a memo from the chairperson telling you to be prepared at the next meeting to discuss key questions that need to be addressed if the company decides to look further into the possibility of marketing to the BOP segment. The ultimate goal of this meeting will be to establish a set of general guidelines...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

  • Read the articles provided (Riggio, 2008) and Javidan & Walker (2012). Perform a self-assessm...

    Read the articles provided (Riggio, 2008) and Javidan & Walker (2012). Perform a self-assessment of the global mindset competencies. What competencies do you feel are your strengths? Your areas for improvement? What next learning steps could you take to address your areas for improvement? LEADERSHIP DEVELOPMENT: THE CURRENT STATE AND FUTURE EXPECTATIONS Ronald E. Riggio Claremont McKenna College This article discusses the common themes in this special issue of Consulting Psychology Journal on "Leadership Development" and summarizes some of the...

  • write up an essay on the problems in budgeting derived from the articles (i do Upvote...

    write up an essay on the problems in budgeting derived from the articles (i do Upvote the answers ) Why Budgeting Kills Your Company HBSWK Pub. Date: Aug '1 1, 2003 Why doesn't the budget process work? Read what experts say about not only changing your budgeting process, but whether your company should dispense with budgets entirely. by Loren Gary The average billion-dollar company spends as many as 25,000 person-days per year putting together the budget. If this all paid...

  • Read the Article posted below, then answer the following questions: Mergers & acquisitions are a major...

    Read the Article posted below, then answer the following questions: Mergers & acquisitions are a major form of corporate diversification strategy, identify and discuss the top three reasons why most (50-60%) of acquisitions fail to create shareholder value. What are the five major components of “CEMEX Way” and why has this approach been so successful in post-acquisition integration? In your opinion, what can other companies learn from the “CEMEX Way” as a benchmark for acquisition management? Article: CEMEX: Globalization "The...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT