Nt1310 Unit 3 Assignment 1

Decent Essays
Professor Doupé,

Thank you for your reply, and for your questions. We are excited to potentially have your guidance in our research, and hope we have provided clear explanations to your questions below:

1. SSL/TLS encryption secures data flowing between client and server. Using SSL during an authentication attempt could provide a secure way for a non malicious server to authenticate with the device, while blocking out sign in attempts from malware.

2. It seems that many drive by downloads are malicious code injected into legitimate websites. When the client connects to aforementioned website, an SSL/TLS connection may occur, and the malicious download may "piggyback" on the handshake between the client and legitimate server, thereby bypassing security measures.
…show more content…
We also plan to test a couple other methods. Getting rid of debugging access could also be an effective method, since such components are often accessed through a hard-coded, default password (mirai can easily defeat this). Therefore, removing them is essentially "plugging a hole" in the devices security.

Another avenue of defense could be encryption of the device's data. While this encryption may not directly defend against the malware, it may prevent it from reading sensitive data and/or instigating a denial of service attack.

An idea we came up with after writing our white paper plays off the fact that mirai will not attack certain IP's, such as Government IP's, those of major corporations, or any devices on the local network. We were wondering if making the device spoof one of these IP's when communicating with a malware could cause the malware to "pass by" the device, not even attempting to infect it.

We hope we have been able to provide satisfactory answers to your questions. Again, we express our excitement at potentially working under your guidance on our project, and would love any feedback regarding our research.

Related Documents

  • Improved Essays

    Sara Ann Thornley 2/3/17 Macronutrients Dr. Huggins Assignment #1 1. A reducing sugar is a sugar that is capable of breaking down certain substances. They have a free ketone or aldehyde group which allows them to become hemiacetale and hemiketals (Gropper, 65).…

    • 528 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    On october 12, 2015 at or about 1102 hours i was dispatched to 1735 east young circle (publix supermarket), hollywood florida, in reference to a cellphone being taken. Upon further investigation it was later found that the cellphone would equal the amount to grand theft (over $300.00usd). Let it be also noted during the time of this investigation, i was working an off-duty detail at the above location. Upon arrival i made contact with the james othman, herein after referred to as the victim. The victim advised me that at approximately 1051 hours his phone was taken from the customer service counter (located at the south side of the store).…

    • 587 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Upgrade your iMac into the machine that will help you provide quality outputs at ultra-fast speeds. With a 4GB DDR3 SODIMM Laptop RAM, you’ll raise your iMac’s capacity beyond industrial standard and provide the consistent efficiency when you’re required to, or better yet, just for your personal use. With 4GB worth of RAM, this DDR3 upgrade provides an optimal processing speed for your iMac to work with data with incredible results. That means you can open apps instantly, access data with less loading time, and operate a more responsive system regardless of you’re doing a system-intensive task or project. At 1333 MHz, you’ll be able to finish projects faster, better and a lot more consistent than ever.…

    • 291 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    With a 27-inch Retina 5K display combined with the AMD Radeon R9 M290X graphics processor with 2GB of GDDR5 memory, it allows you to do precise pixel-for-pixel photo editing and see photos in a resolution you’ve never seen before in a computer. Also, you will be able to view and edit 4K videos without experiencing any problem. This is really important when it comes to a graphic design job, considering they work with high-resolution photos and videos. Having a fourth-generation quad-core 4.0GHz Intel Core i7 processor and 8GB RAM, the performance and speed is the best you would have ever experienced. You can multi-task without any problem and get the job done easier and faster than before.…

    • 254 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Ilab 5 jerry Metcalf Keller Graduate School of Management Professor: Gregory Gleghorn 6/4/2017 VPN Connection The type of VPN connection solution that we will be using to connect user to the internet work will be the Cisco Any connect client and the RSA secureID. We will be going in to detail of how the connection process goes and also how to configure it. Both clients are required in order for the user to authenticate and connect to the company network. When the user is connected they will be able to do their job remotely and send and retrieve information remotely.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Implementing Firewall Filter Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network. First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Policy-based management: SQL server has a feature called policy-based management which is used to define and also implement policies in SQL server. It is used if we want to apply any policy against a table or database and then checks whether the database or table satisfies with the given policy. If target database objects are not satisfied with the policies then either a trigger should be fired or we can enforce it so that an administrator will come to know that there is some policy violation. It will manage one or more instances of SQL server.…

    • 391 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Charline Marcelle Unit 3 Assignment 1 Capella University Professor: Angela Wu Marketing Segments The drive behind marketing segments is to allow the marketing folks to concentrate on the subject and perspectives of their products. When marketing segments are done properly it helps ensure the highest return. This all depends on the sale of the product and the types of buyers for the product. A lot of companies mold their marketing segments by using results of analysis and research.…

    • 763 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    WSUS is a Windows Server Update Service, that allows the administrators to have a server with Windows updates on site. Administrators can test new updates and approve the successfully tested Windows updates for release. Only the approved updates will be applied to the client computers. Using Group Policy, the administrators can point client computers to WSUS server, so the client computers will only receive the tested and approved updates from this server, instead of receiving all the updates (including potentially harmful updates) from the Windows update web site. This assures, that none of the new Windows updates will create unexpected issues with the clients' systems.…

    • 572 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    SIP Trunking BroadConnect boasts its many years of experience and emphasis on customization. We take every business and design the best phone systems content for it, based on your needs and budget. Since we understand that communication is a major component of a successful business, you will never receive excessive or useless features that will only hinder your company’s ability to grow. Our network is prevalent throughout North America, and it uses converged T1 that is fast and reliable.…

    • 480 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1006 Words
    • 5 Pages

    Create new scope of server, Assign scope name and description. Now define a range of IP address, start and end date Now use any excusive address that is server IP address Now select lease duration, now configure DHCP [3] options now Insert router IP address which is 192.168.1.1 in my case, press next---> Next--->activate scope now--->then finish 5) Roaming Profile [4]: For creating of centrally profile [4] of all domain users’ roaming profile [4] is use. In roaming profile we simply share and folder and assign it to all authorized domain user.…

    • 1006 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Web server A web server processes requests using HTTP, the most basic network protocol used for information on the World Wide Web. HTML is the most frequent protocol for WWW and it may include images, scripts and style sheets in addition to text content. A user agent (eg. a browser) communicates by requesting a specific set of data using HTTP.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Nt1310 Week 5 Assignment

    • 1313 Words
    • 6 Pages

    This Week Five Assignment will focus on the components of the neuroscience aspects topic of the Post-traumatic Stress Disorder (PTSD). I will include the causes of it which is the theories of etiology. I will also review how the factors develops it’s genetic, environmental, familial or lifestyle. I will analyze the pathology, including genetics and biochemical aspects. Then, having to diagnose the research technologies on PSTD.…

    • 1313 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Inspired by the work I did at Thales, particularly on the simulation bridge program that involved video streaming, I was able to come up with an interesting idea for my Capstone project. The idea, although novel, had some potentially military applications and I thought my supervisors at Thales might systems could make investigating the idea significantly easier. As a result I sent a quick write up of my idea to Peter, who forwarded it to a number of different engineers. Based on their feedback, I further refined my project into a succinct proposal and set up a meeting with them. [b] At the meeting I provided them with a print out of my revised proposal and formally presented what…

    • 510 Words
    • 3 Pages
    Decent Essays