Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Bay Ridge Security Consulting (BRSC) provides security consulting services to a

ID: 3920790 • Letter: B

Question

Bay Ridge Security Consulting (BRSC) provides security consulting services to a wide range of businesses, individuals, schools, and organizations. These clients have networks that range from small to large, consisting of both physical and virtualized hosts. Because of its reputation and increasing demand for its services, BRSC has partnered with a local school to hire students close to graduation to assist them on specific projects. This not only helps BRSC with their projects but also provides real-world experience to students who are interested in the security field.

Clean Up! (CU) is a service that provides cleaning services to offices as well as residential homes. Customers can enter information on CU's Web site to request a specific date for cleaning services, to register for special carpet cleaning services, and other features. Due to recent layoffs in CU's IT department because of lower-than-anticipated revenue, they have had difficulty maintaining Web application security on their servers. Recently, CU was the victim of a typical injection attack, and the president of the company is furious. He has demanded that the IT department hire someone to help them with the problem. CU has contacted BRSC, who in turn has hired you to help them.

One of CU's IT staff has contacted you, claiming that due to the layoffs the staff no longer has the expertise nor the time to properly secure the Web application servers. In fact, there are several security problems that could result in even more attacks. She has asked you to make this clear to the president. However, the BRSC management views CU as a customer and does not want to do anything that would jeopardize the account. This has put you in a difficult situation. To convince management that serious actions need to be taken, you need to:

List 3 possible injection attacks that could be launched on the CU’s web application server as a result of this lack of security maintenance (1 point).

Briefly explain how each of such attacks could be perpetrated on the web server (3 points).

A second BRSC customer is considering the purchase of Bluetooth devices for its senior management employees. Before getting into such venture, this customer wants to understand how this technology works, as well as what they may up against, as a result of implementing this technology. As a security analyst, BRSC has asked you to work with this customer and your responsibilities include the following:

Describe the ad hoc networks used to link Bluetooth devices (2 points)

List 2 main attacks on such devices (1 point)

Explain each of above 2 main attacks (2 points)

How do you prevent such attacks (2 points)

Another BRSC’s client is considering implementing virtualization, but they need to have a better understanding about this technology. BRSC has assigned you to this task and you are asked to:

List 3 benefits to hosts that run virtualization (1 point).

Briefly explain each of the benefits (3 points)

Explanation / Answer

List 3 possible injection attacks that could be launched on the CU’s web application server as a result of this lack of security maintenance (1 point).

Answer:

The tree possible injection attacks that could be launched on the CU’s web application server as a result of this lack of security maintenance are:

Briefly explain how each of such attacks could be perpetrated on the web server (3 points)

Describe the ad hoc networks used to link Bluetooth devices  (2 points)

Answer:

The Bluetooth devices can be connected via ad hoc networks:

List 2 main attacks on such devices (1 point).

Explain each of above 2 main attacks (2 points)

Answer:

The two main attacks on Bluetooth devices are:

How do you prevent such attacks (2 points)

Answer:

How to prevent Bluejacking:

How to prevent Bluebugging:

List 3 benefits to hosts that run virtualization  (1 point).

Briefly explain each of the benefits (3 points)

Answer:

The three benefits to hosts that run virtualisation:

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote