ASS 4 secu 422
.docx
keyboard_arrow_up
School
New Jersey City University *
*We aren’t endorsed by this school
Course
422
Subject
Electrical Engineering
Date
Apr 3, 2024
Type
docx
Pages
2
Uploaded by BarristerJackalMaster1076
Describe leading threats (Virus, Worm, Trojan Horses, Rootkits, Social Engineering, and Botnet).
Describe the malware detection symptoms.
Describe defense in depth.
1.
Leading threats in the realm of cyber security start with viruses. Viruses is a malicious software that attaches itself to legitimate files in order to spread from one computer to the other. Worms on the other hand is a standalone program that replicates itself through networks without requiring any authorization. The most effective in my opinion trojan horse is a malware that not only disguises as a legitimate software, but it tricks users into downloading the software which can be done in a single click. Rootkit on the other hand is malware that is designed to conceal their presence on a system while providing unauthorized access to an attacker. Furthermore, social engineering is a technique in which attackers manipulate individuals’ confidentiality to provide them restricted access. This form of threat conjoined with a trojan horse, or a worm is very effective. Lastly, a botnet is a network of compromised bots that control a single entity. They are normally more effective in a large number of computers with other malware like worms or viruses. 2.
The malware detection system includes software like Network intrusion
detection, Host intrusion detection, antivirus, and security auditing. These systems input servers and system logs that are well coordinated
and co relates logs from many systems which tract the status of incident disclosure. 3.
Defense in the field of cyber security has many different layers beginning with perimeter defense, networks security, end point security, IAM and security monitoring/incident report. Network security is the farthest layer of defense which focuses on protecting the network’s perimeter from any unauthorized users. This can be as simple as a firewall or security gateway device. Network security on the other hand protects the internal network traffic k and communications this can involve NAC and VPNS. Furthermore, end point security refers to computer’s smartphones and servers; these are
all devices that represent a potential entry point for hackers. Devices like host-based firewalls or EDR systems are used while securing and organizations endpoint. IAM other know as identity and access management identifies all the access rights and maintains them secure. Solutions can involve MFA, SSO, and cross sire scripting. Lastly,
Incident response/security monitoring handles specifics attack
incidents. This group is a team of different specialists that have knowledge relating network protocols, OS, physicals security issues and malicious code.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Give an example of an interface module used in a communications system, then explain its basic operation, and the specific function of each of the elements/components of the module.
arrow_forward
Please solve this exam style question, clearly and simply.
arrow_forward
What are the major components of a SCADA system in a Nuclear Power Plant? Provide its functions.
State how does a SCADA system in a Nuclear Power Plant works.
arrow_forward
4- A network administrator is troubleshooting connectivity issues on a server. Using a tester, the
administrator notices that the signals generated by the server NIC are distorted and not usable.
In which layer of the OSI model is the error categorized?
c) data link layer
b) physical layer
d) presentation layer network printing using a print server
5- What service is provided by SMTP?
network layer
a) Allows remote access to network devices and servers.
b) Uses encryption to provide secure remote access to network devices and servers.
c) Allows clients to send email to a mail server and the servers to send email to other
servers.
d) An application that allows real-time chatting among remote users.
arrow_forward
ii.
Explain in your own words the different high speed protocols which
are used by microcontrollers to communicate with peripheral
devices. Give details of the connections and waveforms you would
expect to see on these connections.
arrow_forward
( Answers to be solved with proper steps and uploaded within one file into Moodle)
c. Construct the truth table and then determine the Minterms and Maxterms for a given system after determining the out put X
from the given circuit diagram.
A
arrow_forward
You are tasked with designing an embedded system using an ATmega32 microcontroller. The system
should perform the following tasks:
2. 7-Segment Cathode Display Control:
a. Connect two 7-segment cathode displays to the microcontroller.
b. Implement the code to show '7.3' for 2 seconds using the concept of multiplexing.
Continue running the code as long as the ATmega32 is powered on. To be noted that, the crystal
frequency is 16MHz.
arrow_forward
Create an Arduino program with the following condition.
Print the states of the potentiometer and LED in the Serial
monitor.
A. Turns LED 1 on and LED 2 off when the pot is rotated
between 25% and 50%
B.
Turns LED 1 off and LED 2 on when the pot is rotated
between 50% and 75%
C. Flashes LED 1 at 5Hz and turns, LED 2 off when the pot
is rotated less than 25%
D. Turns LED 1 off and flashes LED 2 at 5Hz when the pot
is rotated more than 75%
arrow_forward
MAKE A FLOW CHART AND EXPLAIN
arrow_forward
7. At laundromats, using coins and/or pre-paid cards will turn on a dryer machine which
consists of a heating source and a motor that turns the inner cylindrical chamber where
the wet fabrics are placed. Once a certain amount of time has passed, the dryer will
automatically turn off.
a) Please create a combination logic gate using AND, NOT and/or OR logic gates that
would simulate the logic gate circuit necessary to produce the same outcome as a
timed dryer machine. Be sure to properly label and explain your logic gate system.
b) Please create a combination logic gate using only NAND logic gates that would
simulate the logic gate circuit necessary to produce the same outcome as a timed
dryer machine. Be sure to properly label and explain your logic gate system.
arrow_forward
Q27. a) What do you mean by PD controller
?.Draw the electronic circuit of PD controller
and also write the electronic output equation
and General controller output equation .
b) Draw the symbol of NOR gate .Also write
the Truth table and Ladder diagram of NOR.
arrow_forward
What is a GOOSE message? For what purposes is it used and how is the message
delivered? What are its shortcomings in terms of cybersecurity?
arrow_forward
Wire a circuit using various components such as j-k flip flops, gates, etc to make a cycle where 3 LEDS blink rapidly twice and then a short pause followed by 3 LEDS rapidly blinking again (same 3 LEDS). (a repeated cycle).
arrow_forward
Give at least two processes (1 industrial plant and 1 Power plant) where a SCADA system is applied or used. Identify the major components of a SCADA system on those processes that you have chosen and explain each process. Show pictures for each major component involved.
arrow_forward
Which of the following are part of the purpose of a network protocol.
The answer could be more than one
arrow_forward
•An ISP is granted a block of addresses starting with
190.100.0.0/16. The ISP needs to distribute these
addresses to two groups of customers as follows:
•The first group has 64 customers; each needs 128 IP
addresses.
•The third group has 128 customers; each needs 64 IP
addresses.
• Write at least the first and last IP addresses for the first
two and last two customers in each group.
arrow_forward
Solve these three MCQs. No need to explain the MCQs. Reference book Barry B Brey 8th edition.
1) During the DMA bus cycle the system bus is driven by the DMA controller, not by the MPUSingle choice.
a) No
b) Yes
2) There are _______ banks of data memory in 16F877.Single choice.
a) 3
b) 4
c) 6
d) 2
3)There are total of ___________ instructions in PIC 16F877.Single choice.
a) 39
b) 31
c) 43
d) 35
arrow_forward
What are the operations that can be performed via SCADA? What are the data
that can be monitored in SCADA? Explain why SCADA should be preferred.
arrow_forward
Q. No 3. In a Public Switch Telephone Network (PSTN), how the analog speech signal is converted to
digital signal in the PCM? Also highlight the main functions of the given parts in the PSTN figure.
Public Switched Trelephone Network
PSTN
W7CLOUD.COM
Central Office
arrow_forward
Can you write the answer with assembly code using 8051 architecture?
arrow_forward
no handwritten, explanation in detail for QPSK as mentioned. don't copy paste from other sites
arrow_forward
Subject: Computer Networks
Note: Please answer in own words. copy from internet will very unhelpful for me.
Question:
Explain the timing diagrams of two different connection establishment mechanisms of TCP.
arrow_forward
44
For which of the following should a PV system owner expect maintenance costs over the life of
the system?
Module replacement
Inverter replacement
System warranties
Polarity testing
Domain: Sales and Economics
45
What is the MAXIMUM number of modules allowed in a string with the following module
specifications and conditions?
Voç: 80.8
Ymp: 62.7
Temperature coefficient (Voc): -0.28%/" C
Maximum system voltage: 600V
Record cold temperature at the site: -10 C
6.
7
8.
46
Which is the BEST tool to use to verify the open-circuit voltage of a PV module?
Ammeter
Megohmmeter
Multimeter
Oscilloscope
arrow_forward
Question is under attachment.
arrow_forward
1) what is vas
the operation of the FET?
(off)? How could it effects
2)What is IDS?
arrow_forward
Similar to the GTO, IGBT can be designed to block negative voltage ....
What does this sentence mean?What is the advantage block negative voltage??
arrow_forward
Explain the phenomenon aliasing, when it is observed and how it can be prevented
arrow_forward
Q. 3 Look online resources for Intel 8255A Programmable Peripheral Interface.
i. Draw neat pin diagram of 8255A.
ii. Briefly explain its usage. (not more than 2 statements)
Answer you given me what book you used
arrow_forward
Which of the following statements is/are TRUE? (Choose all that apply)
Select one or more:
a. The noise margin of a gate indicates the amount of noise it adds to system.
b. Glitches always occur when there is unbalanced delays in inputs of gates.
c. The propagation delay of a gate varies with its actual fan-out.
d. The propagation delay of gates within a digital system affects the maximum frequency that the system can operate.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
EBK ELECTRICAL WIRING RESIDENTIAL
Electrical Engineering
ISBN:9781337516549
Author:Simmons
Publisher:CENGAGE LEARNING - CONSIGNMENT
Related Questions
- Give an example of an interface module used in a communications system, then explain its basic operation, and the specific function of each of the elements/components of the module.arrow_forwardPlease solve this exam style question, clearly and simply.arrow_forwardWhat are the major components of a SCADA system in a Nuclear Power Plant? Provide its functions. State how does a SCADA system in a Nuclear Power Plant works.arrow_forward
- 4- A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized? c) data link layer b) physical layer d) presentation layer network printing using a print server 5- What service is provided by SMTP? network layer a) Allows remote access to network devices and servers. b) Uses encryption to provide secure remote access to network devices and servers. c) Allows clients to send email to a mail server and the servers to send email to other servers. d) An application that allows real-time chatting among remote users.arrow_forwardii. Explain in your own words the different high speed protocols which are used by microcontrollers to communicate with peripheral devices. Give details of the connections and waveforms you would expect to see on these connections.arrow_forward( Answers to be solved with proper steps and uploaded within one file into Moodle) c. Construct the truth table and then determine the Minterms and Maxterms for a given system after determining the out put X from the given circuit diagram. Aarrow_forward
- You are tasked with designing an embedded system using an ATmega32 microcontroller. The system should perform the following tasks: 2. 7-Segment Cathode Display Control: a. Connect two 7-segment cathode displays to the microcontroller. b. Implement the code to show '7.3' for 2 seconds using the concept of multiplexing. Continue running the code as long as the ATmega32 is powered on. To be noted that, the crystal frequency is 16MHz.arrow_forwardCreate an Arduino program with the following condition. Print the states of the potentiometer and LED in the Serial monitor. A. Turns LED 1 on and LED 2 off when the pot is rotated between 25% and 50% B. Turns LED 1 off and LED 2 on when the pot is rotated between 50% and 75% C. Flashes LED 1 at 5Hz and turns, LED 2 off when the pot is rotated less than 25% D. Turns LED 1 off and flashes LED 2 at 5Hz when the pot is rotated more than 75%arrow_forwardMAKE A FLOW CHART AND EXPLAINarrow_forward
- 7. At laundromats, using coins and/or pre-paid cards will turn on a dryer machine which consists of a heating source and a motor that turns the inner cylindrical chamber where the wet fabrics are placed. Once a certain amount of time has passed, the dryer will automatically turn off. a) Please create a combination logic gate using AND, NOT and/or OR logic gates that would simulate the logic gate circuit necessary to produce the same outcome as a timed dryer machine. Be sure to properly label and explain your logic gate system. b) Please create a combination logic gate using only NAND logic gates that would simulate the logic gate circuit necessary to produce the same outcome as a timed dryer machine. Be sure to properly label and explain your logic gate system.arrow_forwardQ27. a) What do you mean by PD controller ?.Draw the electronic circuit of PD controller and also write the electronic output equation and General controller output equation . b) Draw the symbol of NOR gate .Also write the Truth table and Ladder diagram of NOR.arrow_forwardWhat is a GOOSE message? For what purposes is it used and how is the message delivered? What are its shortcomings in terms of cybersecurity?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- EBK ELECTRICAL WIRING RESIDENTIALElectrical EngineeringISBN:9781337516549Author:SimmonsPublisher:CENGAGE LEARNING - CONSIGNMENT
EBK ELECTRICAL WIRING RESIDENTIAL
Electrical Engineering
ISBN:9781337516549
Author:Simmons
Publisher:CENGAGE LEARNING - CONSIGNMENT