ASS 4 secu 422
.docx
keyboard_arrow_up
School
New Jersey City University *
*We aren’t endorsed by this school
Course
422
Subject
Electrical Engineering
Date
Apr 3, 2024
Type
docx
Pages
2
Uploaded by BarristerJackalMaster1076 on coursehero.com
Describe leading threats (Virus, Worm, Trojan Horses, Rootkits, Social Engineering, and Botnet).
Describe the malware detection symptoms.
Describe defense in depth.
1.
Leading threats in the realm of cyber security start with viruses. Viruses is a malicious software that attaches itself to legitimate files in order to spread from one computer to the other. Worms on the other hand is a standalone program that replicates itself through networks without requiring any authorization. The most effective in my opinion trojan horse is a malware that not only disguises as a legitimate software, but it tricks users into downloading the software which can be done in a single click. Rootkit on the other hand is malware that is designed to conceal their presence on a system while providing unauthorized access to an attacker. Furthermore, social engineering is a technique in which attackers manipulate individuals’ confidentiality to provide them restricted access. This form of threat conjoined with a trojan horse, or a worm is very effective. Lastly, a botnet is a network of compromised bots that control a single entity. They are normally more effective in a large number of computers with other malware like worms or viruses. 2.
The malware detection system includes software like Network intrusion
detection, Host intrusion detection, antivirus, and security auditing. These systems input servers and system logs that are well coordinated
and co relates logs from many systems which tract the status of incident disclosure. 3.
Defense in the field of cyber security has many different layers beginning with perimeter defense, networks security, end point security, IAM and security monitoring/incident report. Network security is the farthest layer of defense which focuses on protecting the network’s perimeter from any unauthorized users. This can be as simple as a firewall or security gateway device. Network security on the other hand protects the internal network traffic k and communications this can involve NAC and VPNS. Furthermore, end point security refers to computer’s smartphones and servers; these are
all devices that represent a potential entry point for hackers. Devices like host-based firewalls or EDR systems are used while securing and organizations endpoint. IAM other know as identity and access management identifies all the access rights and maintains them secure. Solutions can involve MFA, SSO, and cross sire scripting. Lastly,
Incident response/security monitoring handles specifics attack
incidents. This group is a team of different specialists that have knowledge relating network protocols, OS, physicals security issues and malicious code.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
What are the major components of a SCADA system in a Nuclear Power Plant? Provide its functions.
State how does a SCADA system in a Nuclear Power Plant works.
arrow_forward
ii.
Explain in your own words the different high speed protocols which
are used by microcontrollers to communicate with peripheral
devices. Give details of the connections and waveforms you would
expect to see on these connections.
arrow_forward
R
R
R
Q
S
(a)
(b)
(c)
For each circuit above, discuss whether or not the circuit has really the same behaviour as the
RS latch. Hint: use NOR gate for the RS latch and then do the analysis.
arrow_forward
2) Design a 4-bit up/down gray counter?
arrow_forward
a. Complete the truth table for the circuit.b. What mathematical function does this circuitperform, and what do the outputs signify?c. How many standard 14-pin ICs would it take toconstruct this circuit?
arrow_forward
1. A circuit with 2 or more connected transistors is called _________ or multi-staged amplification.
A) Cascaded
B) Inverter
C) Dual amplifier
D) Rectifier2. He is an Austrian-Hungarian physicist who developed the first undocumented semi-conductor device.
A) Edward Howard
B) Elizabeth Miles
C) Morgan Sparks
D) Julies Edgar Lilienfeld3. Who made the Bipolar junction?
A) Daniel Levi
B) John Jonson
C) Mathew Wills
D) Morgan Sparks
arrow_forward
Create an Arduino program with the following condition.
Print the states of the potentiometer and LED in the Serial
monitor.
A. Turns LED 1 on and LED 2 off when the pot is rotated
between 25% and 50%
B.
Turns LED 1 off and LED 2 on when the pot is rotated
between 50% and 75%
C. Flashes LED 1 at 5Hz and turns, LED 2 off when the pot
is rotated less than 25%
D. Turns LED 1 off and flashes LED 2 at 5Hz when the pot
is rotated more than 75%
arrow_forward
For the circuit shown in Figure 1, answer the following
questions:
D1
Y
D2
Figure 1
i. Explain the working of the circuit for different input
combinations along with the truth-table.
ii. Modify the circuit diagram of Figure 1 to work as a
NAND gate circuit.
iii. Explain the working of the NAND gate circuit for
different input combinations along with the truth-table.
arrow_forward
The Government decides to fix an automatic street light system for
which light sensors are used. For each area, they decided to place
four light sensors. The street light is ON if it receives positive output
from at least two sensors else OFF. Design a combinational circuit
to implement the required task using
a) only two input NAND gate
b) only two input NOR gates.
State any assumption made.
arrow_forward
Q. 2 Browse for the datasheet of 8086 from Intel and using the information from datasheet
answer the following.
i. Draw neat pin diagram of 8086.
ii. Explain the functions of the individual pins of 8086.
Answer you given me what book you used
arrow_forward
Browse for the datasheet of 8086 from Intel and using the information from datasheet answer the following.i. Draw neat pin diagram of 8086.ii. Explain the functions of the individual pins of 8086.
arrow_forward
Give at least two processes (1 industrial plant and 1 Power plant) where a SCADA system is applied or used. Identify the major components of a SCADA system on those processes that you have chosen and explain each process. Show pictures for each major component involved.
arrow_forward
Wire a circuit using various components such as j-k flip flops, gates, etc to make a cycle where 3 LEDS blink rapidly twice and then a short pause followed by 3 LEDS rapidly blinking again (same 3 LEDS). (a repeated cycle).
arrow_forward
What is a GOOSE message? For what purposes is it used and how is the message
delivered? What are its shortcomings in terms of cybersecurity?
arrow_forward
What is the fundamental notion underpinning MEMS storage?
arrow_forward
Q. 2 Browse for the datasheet of 8086 from Intel and using the information from datasheet
answer the following.
i. Draw neat pin diagram of 8086.
ii. Explain the functions of the individual pins of 8086.
arrow_forward
What are the operations that can be performed via SCADA? What are the data
that can be monitored in SCADA? Explain why SCADA should be preferred.
arrow_forward
What are the vulnerabilities do you see in EIGRP protocol? How one can mitigate that?
arrow_forward
What is a transmission gate? Draw its circuit circuit diagram. How does it operate? What is the need for a transmission gate? What is it disadvantage?
arrow_forward
Solve these three MCQs. No need to explain the MCQs. Reference book Barry B Brey 8th edition.
1) During the DMA bus cycle the system bus is driven by the DMA controller, not by the MPUSingle choice.
a) No
b) Yes
2) There are _______ banks of data memory in 16F877.Single choice.
a) 3
b) 4
c) 6
d) 2
3)There are total of ___________ instructions in PIC 16F877.Single choice.
a) 39
b) 31
c) 43
d) 35
arrow_forward
1. For system identification, the structure and parameters of the model are determined by the measured data of the ............. and............... of this application object.
Fill the blank and explain?
arrow_forward
(a)A typical TTL IC is numbered as
DM54AS04N.Explain the meaning of each portion
of this number?-
(b) What are types of scale of integration? Briefly
explain VLSI?(
(c)Draw the diagram of Monostable Multivibrator
using 555 timer? -
arrow_forward
draw the curcuit diagram for 4 channel 4 bit multiplexer implemented using 4 channel 1 bit multiplexer.
make sure that i need full circuit to save the final multiplexer in the library.
arrow_forward
What are the minimum and maximum propagation?delays for 1 gate for a 7408 chip? 7402 chip? 7404chip? 7432 chip?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
EBK ELECTRICAL WIRING RESIDENTIAL
Electrical Engineering
ISBN:9781337516549
Author:Simmons
Publisher:CENGAGE LEARNING - CONSIGNMENT
Related Questions
- What are the major components of a SCADA system in a Nuclear Power Plant? Provide its functions. State how does a SCADA system in a Nuclear Power Plant works.arrow_forwardii. Explain in your own words the different high speed protocols which are used by microcontrollers to communicate with peripheral devices. Give details of the connections and waveforms you would expect to see on these connections.arrow_forwardR R R Q S (a) (b) (c) For each circuit above, discuss whether or not the circuit has really the same behaviour as the RS latch. Hint: use NOR gate for the RS latch and then do the analysis.arrow_forward
- 2) Design a 4-bit up/down gray counter?arrow_forwarda. Complete the truth table for the circuit.b. What mathematical function does this circuitperform, and what do the outputs signify?c. How many standard 14-pin ICs would it take toconstruct this circuit?arrow_forward1. A circuit with 2 or more connected transistors is called _________ or multi-staged amplification. A) Cascaded B) Inverter C) Dual amplifier D) Rectifier2. He is an Austrian-Hungarian physicist who developed the first undocumented semi-conductor device. A) Edward Howard B) Elizabeth Miles C) Morgan Sparks D) Julies Edgar Lilienfeld3. Who made the Bipolar junction? A) Daniel Levi B) John Jonson C) Mathew Wills D) Morgan Sparksarrow_forward
- Create an Arduino program with the following condition. Print the states of the potentiometer and LED in the Serial monitor. A. Turns LED 1 on and LED 2 off when the pot is rotated between 25% and 50% B. Turns LED 1 off and LED 2 on when the pot is rotated between 50% and 75% C. Flashes LED 1 at 5Hz and turns, LED 2 off when the pot is rotated less than 25% D. Turns LED 1 off and flashes LED 2 at 5Hz when the pot is rotated more than 75%arrow_forwardFor the circuit shown in Figure 1, answer the following questions: D1 Y D2 Figure 1 i. Explain the working of the circuit for different input combinations along with the truth-table. ii. Modify the circuit diagram of Figure 1 to work as a NAND gate circuit. iii. Explain the working of the NAND gate circuit for different input combinations along with the truth-table.arrow_forwardThe Government decides to fix an automatic street light system for which light sensors are used. For each area, they decided to place four light sensors. The street light is ON if it receives positive output from at least two sensors else OFF. Design a combinational circuit to implement the required task using a) only two input NAND gate b) only two input NOR gates. State any assumption made.arrow_forward
- Q. 2 Browse for the datasheet of 8086 from Intel and using the information from datasheet answer the following. i. Draw neat pin diagram of 8086. ii. Explain the functions of the individual pins of 8086. Answer you given me what book you usedarrow_forwardBrowse for the datasheet of 8086 from Intel and using the information from datasheet answer the following.i. Draw neat pin diagram of 8086.ii. Explain the functions of the individual pins of 8086.arrow_forwardGive at least two processes (1 industrial plant and 1 Power plant) where a SCADA system is applied or used. Identify the major components of a SCADA system on those processes that you have chosen and explain each process. Show pictures for each major component involved.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- EBK ELECTRICAL WIRING RESIDENTIALElectrical EngineeringISBN:9781337516549Author:SimmonsPublisher:CENGAGE LEARNING - CONSIGNMENT
EBK ELECTRICAL WIRING RESIDENTIAL
Electrical Engineering
ISBN:9781337516549
Author:Simmons
Publisher:CENGAGE LEARNING - CONSIGNMENT