Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Your company wants to send a working virtual machine to customers with a sample

ID: 3583865 • Letter: Y

Question

Your company wants to send a working virtual machine to customers with a sample of its new software, but you are concerned about the security of the software and data. What precautions can you take? You get a call from a high school student named Mark who claims he has just received an e-mail from another student threatening to commit suicide. Mark isn't sure where the student sent the e-mail from. Write a report explaining how you should proceed, including what you should do first in this situation. Visit the Honeynet Projects Scroll down and you will see a list of papers along the right hand side. Read two of the papers and summarize them. As part of your answer, include the name of the two papers. Please note that some of the papers listed may not be available.

Explanation / Answer

1) when my company sends avirtual machine and its software sample to customers thats time i concerned about the security of the software and data.that time i can provide a secruity key for running that software.that secruity key was developed with the use of the the cipher text algorithm which useful to the secruity key is known to me and my customer only.without that secruity key that software can not install.same as like that data also hided with ithe help of the secruity key.for secruity reasions that software cannot give to third partys directly contact with the customers only.

                                                and also i contact with the customers to inform to collect the key information with the file or any other storing device.that key works only with authentication of the owner of the that virtual machine that created as the fingerprint authentication and also eye scanning.           

2)when i get the call from the mark i ask the details of the person who are commit to sucide and known about the e-mail that time i said to mark as forward that e-mail to me and i check that mail senders information findout the ip address of the that mail sending system network know the that location where mail was came.then inform to mark.and also inform to police station also.before doing these searchinig the people who are know to me and live in that location.inform to those people and said to them save his life and give the adress of the that person.

                                                 and also i send that email to sucided person parents and also friends for save his life as possible as.

3)papers are

Know Your Enemy: Malicious Web Servers

client side attacks:

client side attacks are very different.

server honeypots vs client honeypots

identification of malicious webservers

defense evaluation

Know Your Enemy: Fast-Flux Service Networks

single flux networks

double flux service networks

fast flux case study

fast flux malware

advantages for the attacker

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote