Campbellsville University Real world Exercises Discussion

Description

Provide documented evidence, provide answers to each of the stated questions below. Detailed and significant answers will be allotted full point value. Incomplete, inaccurate, or inadequate answers will receive less than full credit depending on the answers provided.

  • Using a web browser, go to www.securityfocus.com. What information is provided under the BugTraq tab? Under the Vulnerabilities tab? On the Vulnerabilities tab, select Microsoft as the Vendor and Windows Messenger as the title, Look for a PNG Bugger Overflow vulnerability. This is the link: https://www.securityfocus.com/bid/12506/exploit
  • Visit the article abstract at www.ncjrs.gov/App/publications/Abstract.aspx?id=246582. Rad the abstract, and then answer this question: Do you think a simulator for training and readiness would help or hinder the quality of response to contingencies? Why or Why not?

What information is provided under the Exploit tab? What does it mean? How could an attacker use this information? How could a security manager?

For more Information please refer: Michael E. Whitman, Herbert J. Mattord, Andrew Green. Principles of Incident

Response and

Disaster Recovery (2014). Cengage Learning. ISBN: 978-1111138059.