Your company wants to send a working virtual machine to customers with a sample
ID: 3583865 • Letter: Y
Question
Your company wants to send a working virtual machine to customers with a sample of its new software, but you are concerned about the security of the software and data. What precautions can you take? You get a call from a high school student named Mark who claims he has just received an e-mail from another student threatening to commit suicide. Mark isn't sure where the student sent the e-mail from. Write a report explaining how you should proceed, including what you should do first in this situation. Visit the Honeynet Projects Scroll down and you will see a list of papers along the right hand side. Read two of the papers and summarize them. As part of your answer, include the name of the two papers. Please note that some of the papers listed may not be available.Explanation / Answer
1) when my company sends avirtual machine and its software sample to customers thats time i concerned about the security of the software and data.that time i can provide a secruity key for running that software.that secruity key was developed with the use of the the cipher text algorithm which useful to the secruity key is known to me and my customer only.without that secruity key that software can not install.same as like that data also hided with ithe help of the secruity key.for secruity reasions that software cannot give to third partys directly contact with the customers only.
and also i contact with the customers to inform to collect the key information with the file or any other storing device.that key works only with authentication of the owner of the that virtual machine that created as the fingerprint authentication and also eye scanning.
2)when i get the call from the mark i ask the details of the person who are commit to sucide and known about the e-mail that time i said to mark as forward that e-mail to me and i check that mail senders information findout the ip address of the that mail sending system network know the that location where mail was came.then inform to mark.and also inform to police station also.before doing these searchinig the people who are know to me and live in that location.inform to those people and said to them save his life and give the adress of the that person.
and also i send that email to sucided person parents and also friends for save his life as possible as.
3)papers are
Know Your Enemy: Malicious Web Servers
client side attacks:
client side attacks are very different.
server honeypots vs client honeypots
identification of malicious webservers
defense evaluation
Know Your Enemy: Fast-Flux Service Networks
single flux networks
double flux service networks
fast flux case study
fast flux malware
advantages for the attacker
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.