Question

In: Computer Science

Assume you have found a USB memory stick in a car park, and you plugged the...

Assume you have found a USB memory stick in a car park, and you plugged the USB memory stick to your computer. Answer the following questions

1.  What are the security key objectives that could be threaten?

2.  Identify and define three types of malware, and give examples about how could they transported from the USB memory stick to your computer.

3.   What could you do to mitigate the security threats and use the contents of the USB memory stick safely?

Solutions

Expert Solution

1)

plugging a unknown USB device to your system is one of the way you can introduce malware( viruses, ransomware and spyware) to your system. Such drives can be infected with ransomware, viruses or any kind of malware which will disrupt the operation of a system in many ways. security key objectives that could be threaten are

->Confidentiality : malware can monitor activities in background ,or can cause data theft ,or data encryption .

->Integrity : malwares can change the information and programs in a system. so integrity will be compromised .

->Availability : malware can deny access to program or information . so in a malware affacted system ,authorized useres could be not able to access information.

---------------------------------------------------------------------------------------

2)

Some computers have auto run option which allow malwares in usb drive can run /copy itself without any permission. this is how all the malwares affect any computer. and through key stroke ( The act of pressing key on a keyboard, that would trigger some particular functions in a computer ) it start functioning.

1. Rubber Ducky Firmware

it is a popular USB malware . it encrypts your files without your permission and without knowing .

2. USBdriveby/USB driveby

it is a powerful program and developer attached it to a USB drive. This device can hack any computer in very less time. When you plug the USBdriveby to your system, it act as a mouse or keyboard. and then it use pre-installed keystrokes for disabling your computer firewall. When firewall down, USBdriveby take down your DNS settings. now hackers can control your system remotely

3. iSeeYou

iSeeYou malware can hack a device’s webcam and record your activities.It’s a malware that affects cameras in infected Apple laptops. iSeeYou disables the LED light of your computer when webcam is on. This way, user will know nothing

------------------------------------------------------------------------------

3)

first of all Don’t plug unknown usb drives into your computer.it contain some one else data . its not any thing that you should see.( what if it s a usb bomb , that is also apossibility . you plug in you die)

things you can do before examining contents of unknown usb drive is

1) disable autorun option from your computer

2) scan the usb drive with most updated antivirus software . it will detect most of the known malwares.

3) donot run any programs / softwares in the usb drive

4) if you want to safely use the drive , safest thing is do 1 & 2 above and . don't open the drive . just format it and use it.


Related Solutions

how to Download Ubuntu 20.04 and store on a USB memory stick, which must act as...
how to Download Ubuntu 20.04 and store on a USB memory stick, which must act as a bootable DVD.
You have been looking around for a nice car and have found the car you want...
You have been looking around for a nice car and have found the car you want for the right price. All along, you have told the dealer that you want to purchase the car. It will cost you $45,000 out the door. You will put 25% down and take out a 4-year car loan. The interest rate you got from a local bank is 2.99% for 48 months. You made the deal and now you need to “finalize” the paperwork...
Purpose:To begin investigating the FAT16 file system on a USB memory device. In particular, you will...
Purpose:To begin investigating the FAT16 file system on a USB memory device. In particular, you will add a file to a FAT16 formatted device and observe the changes made to the FAT table. Deliverables: For Steps 7, 8, 11, and 12 you are to describe, in detail, what happens to the FAT when a file is added. Be specific and explain WHAT happened and WHY. It is acceptable to add small screen shots to you DOC file, but only as...
Have you ever found yourself in a heated debate over a memory dispute with a friend...
Have you ever found yourself in a heated debate over a memory dispute with a friend or family member where both you and the other person swear that their details of a memory are accurate? This week we are going to take a closer look at this phenomenon. After reading about memory in your textbook, discuss the following points: Describe the processes of memory consolidation, recall, and reconsolidation. Based on your understanding of these processes, what happens to older memories...
Psychologists have found that human memory involves three processes: encoding information into memory, storing information in...
Psychologists have found that human memory involves three processes: encoding information into memory, storing information in memory, and retrieving information from memory. Psychologists have also identified specific strategies to help people encode, store, and retrieve information. How can this research help you study for this class more efficiently? What strategies could help you encode and store information in your memory as you study? What strategies could help you retrieve this information when you take a test? In a multi-paragraph essay,...
Psychologists have found that human memory involves three processes: encoding information into memory, storing information in...
Psychologists have found that human memory involves three processes: encoding information into memory, storing information in memory, and retrieving information from memory. Psychologists have also identified specific strategies to help people encode, store, and retrieve information. How can this research help you study for this class more efficiently? What strategies could help you encode and store information in your memory as you study? What strategies could help you retrieve this information when you take a test? In a multi-paragraph essay,...
5. You are out shopping for a new car. You have found a Toyota Sienna priced...
5. You are out shopping for a new car. You have found a Toyota Sienna priced at 34,400. The dealer has told you that if you can come up with a down payment of 3,300, he would be willing to finance the balance at an EAR of 5.65%. for 4 years. You come back home and after doing the math you find that the monthly payment is beyond your means. At this time, you can only afford a monthly payment...
Assume that you are breaking a stick into 3 pieces by uniformly and independently selecting two...
Assume that you are breaking a stick into 3 pieces by uniformly and independently selecting two break points ? and ?. If we denote the event that these pieces form a triangle by T and lengths of the three pieces by ?, ? and ?, calculate: a. ?(? ∩ (? < ? < ?)), b. The probability that the pieces form an equilateral triangle.
If you found an emaciated house cat in a park and decided to provide nutritional rehabilitation,...
If you found an emaciated house cat in a park and decided to provide nutritional rehabilitation, what are 4 important principles that you would consider in deciding your course of action (list and explain)?
You travel to one of the shops where you park your car beside a Ferrari Testa...
You travel to one of the shops where you park your car beside a Ferrari Testa Rossa in the store car park, and enter the store to find an immaculately dressed lady who runs the store on her own. The dresses sold in the store retail for several thousand dollars an item. On chatting to the lady, you discover the Ferrari is her “getting to work” car. You note that there is no cash register and are told that given...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT