Mario Crosby - Chapter 1 Labs (1)
.docx
keyboard_arrow_up
School
Pensacola State College *
*We aren’t endorsed by this school
Course
2211
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
2
Uploaded by HighnessDanger101400
Security Awareness - Chapter 1 Labs
Exercise 1.1: Analyzing Attack Metrics
1.
There is a lot of information on worldwide cyberattacks presented at:
https://securitycenter.sonicwall.com/m/page/capture-labs-threat-metrics
Visit this site and explore the interactive display. Note at the bottom of the screen is a control that allows you to switch between a live attack map, 1 year data metrics, and news. After exploring, switch back to the “Capture Labs Threat Metrics” page.
2.
What percentage change has occurred in Ransomware attacks world-wide over the last year? Since last year of Dec'22 its down -41% over the same period of last year.
3.
Approximately how many cryptojacking attacks occurred world-wide in:
last reported month: 164.37 million
same month in the previous year: 2.14 million
total in North America last year: 139.53
4.
Based on the data you see here, what conclusion(s) could you draw about the trend(s) for cyberattacks worldwide? Do any of the trends stand out to you? (Your opinion, provide data to support your conclusion) In conclusion, from the data displayed the amount of cyber attacks worldwide from the previous year in the different was lower than the current amount. For example, Intrusions worldwide total in the previous year was 592.32 billion and the year after it reached a total of 673.05 billion. This caused an upward trend and resulted in a higher percentage of cyber attacks. Exercise 1.2: Learning About Cookies as Spyware
1.
Get an idea of what kind of information cookies store. You might find the following websites helpful:
www.allaboutcookies.org
www.howstuffworks.com/cookie1.htm
2.
Write a brief summary (about one paragraph) explaining in what way cookies can invade privacy. Cookies can be seen as invading someone's privacy because it collects all the information that is placed onto your device/machine. It acquires the information that you store
on your device whether it is serious personal info or just some basic things. These cookies are like a vault stored with your information and this information could be put at risk due to cyber criminals. They can seize unauthorized information such as your social media, bank accounts, etc. If the cyber hackers can collect any of this information from your cookies they could then sell your valuables to others or be able to pretend they are using your identity. Even though cookies are put into place to help make this smoother for users they also could put these users at significant risk. Web Project: Vulnerability Database
1.
Visit the National Vulnerability Database website using this url:
https://nvd.nist.gov/
2.
Explore the site and then look at the NVD FAQ page (
https://nvd.nist.gov/general/faq
). Below, list 3 things you learned from the FAQ:
a.
When a vulnerability occurs to report, you have to contact the CVE (Common Vulnerabilities and Exposures) Assignment Team. b.
The database updates records when CVEs are uploaded and edited with newer information. c.
T
he difference between CVEs and CWEs is CVEs focus on the specific occurrences of vulnerabilities, while CWE designates the common flaws or weaknesses that can lead potentially to vulnerabilities.
3.
Next explore the Visualizations page. a.
Begin by looking at the distribution of vulnerability types over time (
https://nvd.nist.gov/general/visualizations/vulnerability-visualizations/cwe-over-time
). What trend(s) can you identify by looking over these charts? There isn't a constant change it fluctuates between rising and declining but the trends seem to have gone upward over the years. b.
Next, look at the Severity By Year distribution (
https://nvd.nist.gov/general/visualizations/vulnerability-visualizations/cvss-severity-
distribution-over-time
). How has the severity of vulnerabilities changed over time? Does
anything stand out to you as you look at this chart? The severity of vulnerabilities has increased significantly over time in the chart. What stands out to me on the chart is the trend slightly stayed at a constant rate and then around the year 2017 skyrocketed upward.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help