CSCI 310, Cybersecurity

  1. A(n) ____________ is any input (i.e., a piece of software, an argument string, or sequence of commands) that takes advantage of a bug, glitch or vulnerability in order to cause an attack.

  2. In the Tim Lloyd logic bomb attack on Omega Engineering, what type of vulnerability was the existence of the user, “12345,” an example of?

  3. A file owner wanted to grant full permissions for himself on the file: myfile.ext, read only for his group and he wanted to forbid everyone else from accessing the file. The correct symbolic notation for the file permissions is

  4. A file owner wanted to change file permissions to a file so that the new permissions would allow the file owner to read and execute, and deny anybody else all access. The correct new permissions on the file in octal notation would be

  5. In cyber risk management, _______ the risk by buying a cyber insurance policy is considered as a risk response when considering risk scenarios where investment in security controls is very high.

  6. A(n) _________ attack is an attack on a computer system or network that causes a loss of service to users.

  7. A(n) __________ virus is a virus that mutates with every infection by adding padding code, making detection by the “signature” of the virus impossible.

DETAILED ASSIGNMENT

20210315154942csci_310___assignment_5

Powered by WordPress