Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1) Research and explain how modern day host based anti-virus software works. How

ID: 3683480 • Letter: 1

Question

1) Research and explain how modern day host based anti-virus software works. How does this protect us against unknown threats? What can we do to better protect our host machines against unknown threats? In today’s computing environment, is anti-virus software still necessary? Use these links below to help you get started:

VirusTotal - This tool that was acquired by Google takes a file, hash, or website and scans it against 40 or so of the leading AV vendors. How would using this site for identifing suspicious files be more advantageous than scanning the same file with a local AV client?

Is Antivirus a waste of money? - This article examines the usefulness of todays AV clients in the face of evolving malware sophistication.

2) As a security engineer, compare and contrast the pros and cons of deploying hetero vs homogenous networks. Which costs more? Which offers more protection? Why?

3)

According to the book, user Training is arguably one of the most important ways to harden your network. As the Chief Security Officer of a large company, list and describe three of the most important topics you would want your employees trained on. Then, briefly explain how you would administer and evaluate the training. Remember, most people do not have a technical background so keep it high level (e.g. how to identify social engineering attempts). Use the links below to help you get started:

Train your Employees - This site will give you some tippers on how to enhance computer security awareness for your employees.

Dell Secureworks - Dell offers a service for its customers that promises to promote security awareness training through education, internal testing, and evaluations. This link will send you to a description of the service.

4) Your friend lives in a large apartment complex and fears someone in the building has been accessing their wireless network to avoid paying service charges. They explain to you a large cable company installed the equipment and setup the wireless network using a predefined numeric pin. Upon further discovery, you are able to identify the encryption protocol as WEP. What wireless security enhancements would recommend to your friend? If your friend told you that they needed it as secure as possible so that they could work from home, what other security design elements could they implement. (e.g. signal strength, guard bands, frequency, access control…)

5) In designing your perimeter security project, if there was a set budget of $10,000, how would it affect your plan? What would you focus on? Why? Lastly, research two real world examples where investing in perimeter security could have saved a company a lot of money.

Explanation / Answer

answer are progress

Research and explain how modern day host based anti-virus software works. How does this protect us against unknown threats? What can we do to better protect our host machines against unknown threats?

            A modern, host based antivirus tool is an essential component of most antimalware suites. It must identify known and previously unseen malicious files with the goal of blocking them before they can cause damage. Though tools differ in the implementation of malware-detection mechanisms, they tend to incorporate the same virus detection techniques. Familiarity with these techniques can help you understand how antivirus software works.

VirusTotal

VirusTotal is a website, it provides 61 online scan engines to check for viruses that the user's own antivirus may have missed, or to verify against any false positives. Files up to 128 MB can be uploaded to the website or sent via email. Anti-virus software vendors can receive copies of files that were flagged by other scans but passed by their own engine, to help improve their software and, by extension, VirusTotal's own capability. Users can also scan suspect URLs and search through the VirusTotal dataset.

Types

VTUploader for Microsoft windows

virastotal for browsers

virustotal for mobile

Compare and contrast the pros and cons of deploying hetero vs homogenous networks. Which costs more? Which offers more protection? Why?

            The definition of a heterogeneous computing environment depends to some extent on the application. Here we attempt a definition that is relevant to numerical software. The three main issues determining the classification are the hardware, the communication layer, and the software. Any differences in these areas can potentially affect the behavior of the application. Specifically, the following conditions must be satisfied before a system can be considered homogeneous:

We regard a homogeneous machine as one which satisfies condition (1.) a homogeneous network as a collection of homogeneous machines which additionally satisfies condition (2.) and finally, a homogeneous computing environment as a homogeneous network which satisfies condition (3.) We can then make the obvious definition that a heterogeneous computing environment is one that is not homogeneous.

Homogeneous network costs more than the heterogeneous network

Heterogeneous network environment offer more production than Homogeneous network

Wi-Fi Protected Setup

Wireless security is important, and Wi-Fi wireless networks can enable WPA2, a sophisticated encryption technology that protects data flowing between Wi-Fi radios and access points.

Securing a new network

Real world examples where investing in perimeter security.