Question

In: Computer Science

Regarding the book"ESSENTIAL CYBER SECURITY SCIENCE by JOSIAH DYKSTRA, Chapter 4 & Chapter 5 ., especially...

Regarding the book"ESSENTIAL CYBER SECURITY SCIENCE by JOSIAH DYKSTRA, Chapter 4 & Chapter 5 ., especially CHapter 4 & Ch-5 ONLY... Will you please describe in detail the hardware and software used in those chapter (4&5 only)? Thanks

Solutions

Expert Solution

The book "ESSENTIAL CYBERSECURITY SCIENCE" by JOSIAH DYKSTRA, Chapter 4 and Chapter 5 describes in detail the following hardware and software been used:
From a broad perspective, chapter 4 discusses about software assurance, cybersecurity science for software assurance, especially about a scientific experiment example in software assurance, then fuzzing for software assurance, the scientific method and the Software Development Life Cycle (SDLC), the adversarial models, and a case study about the risk of software exploitability with a new experiment.

The chapter talks about Fitbot hardware device, "Galileo", a Python utility software used to communicate with Fitbit devices, "Peach fuzzer" or a custom Python script (software) to send random data to the Fitbit device trying to generate crashes. It in general talks about general Operating System (OS); Jira software for issue-tracking system, documenting bugs and allowing the organization to prioritize the order the issues are addressed. It talks about Microsoft’s crash analyzer which calculates an exploitability rating based on crash dumps determining exploitability. It talks about FreeBSD and Windows 7 OS software of obtaining the Evaluation Assurance Level (EAL Level 4). It talks about using CPU days on Amazon Elastic Compute Cloud (EC2), which is the processors (virtual processors, CPUs or hardware) in the cloud. It further talks about web app (software) used in fuzzing for software assurance. It talks about verifying complex hardware and software system using formal methods to evaluate a hypothesis using mathematical models.

It talks about the SLAM engine to be used to check if Windows device drivers satisfy driver API usage rules. Metasploit, Armitage, and Cortana to set up a penetration test.

From a broad perspective, chapter 5 talks about an IDS (Intrusion Detection System) machine for intrusion detection and an IDS analysis engine as free and open-source software. It talks about Snort software to detect Denial-of-Service (DoS) alerting on traffic with the same source and destination IP address raising alarms. It talks about "hping3" which is a versatile packet creation tool; with respect to performance benchmarks, netperf software to measure network traffic; Rodinia software to measure accelerated computing such as GPUs, etc.; Linpack software to measure computing power, sysstat software to provide CPU utilization statistics for analysis; Valgrind software tool to detect memory usage and errors; and many other tools for measuring performance.

It talks about the Snort software tool, which is the free and lightweight network intrusion detection package, a rule-based signature engine and a rich language to create signatures to detect the activity of interest. It talks about CPU and RAM hardware.


Related Solutions

what is chapter 1, ch 2, ch 3 of Essential Cyber Security book by Josiah Dykstra...
what is chapter 1, ch 2, ch 3 of Essential Cyber Security book by Josiah Dykstra talking about?
Cyber security is an essential tool for managing risks in today’s increasingly dynamic and capable cyber...
Cyber security is an essential tool for managing risks in today’s increasingly dynamic and capable cyber threat landscape. Yet the market for cyber security remains small, and organizations are making only tactical investments in cyber security measures—one of the reasons why there has been an increase in cyber-attacks. Evidence suggests that this trend will last for some time to come. However, the anticipation of an increasingly open and mobile enterprise should help refocus the spotlight on strategic investments in areas...
Overview A cyber-security company called UltraHackz is interested in finding talented computer science students. To do...
Overview A cyber-security company called UltraHackz is interested in finding talented computer science students. To do so, they post a challenge you find very interesting. They upload a txt file that contains 100 records containing information about 100 system accounts. Each record has a username, a salt value, and a hashed password. Each record is stored as follows: <username>,<salt value>,<hashed password> That is, there is one line per record in the file, where the three values are separated by commas....
Describe each of the 5 main types of cyber security: 1) Critical infrastructure security: 2) Application...
Describe each of the 5 main types of cyber security: 1) Critical infrastructure security: 2) Application security: 3) Network Security: 4) Cloud security: 5) Internet of things security
In regards to the book "Philospohy of Science: A Very Short Introduction", chapter 2, what are...
In regards to the book "Philospohy of Science: A Very Short Introduction", chapter 2, what are your thoughts on hume's problems? Do you think it is a genuine problem that scientists should pay attention to?
In the book "The Shifts and the Shocks" by Martin Wolf, of Chapter 4 How did...
In the book "The Shifts and the Shocks" by Martin Wolf, of Chapter 4 How did finance become fragile? What was the reason?
Quiz 5 (Chapter 10): Other than the examples contained in the book or the article of...
Quiz 5 (Chapter 10): Other than the examples contained in the book or the article of Gilmore and Pine (https://hbr.org/1997/01/the-four-faces-of-mass-customization), provide an example of a company with which you are familiar with brief explanations that is. (I expect you to define each customizer clearly and find one company from EACH category.) An adaptive customizer (10 points worth) A cosmetic customizer (10 points worth) A collaborative customizer (10 points worth) A transparent customizer (10 points worth)
In Chapter 5, the book touches on Diffusion of Innovation on page 152 but I wanted...
In Chapter 5, the book touches on Diffusion of Innovation on page 152 but I wanted to provide you with a little more detail on the topic. It's really important when you think about change- this could be the kind of change that comes when you develop a new product, modify an existing one, or make any kind of organizational change. It's all about how to people adopt (or accept) innovation. The process by which the use of an innovation-...
According to both the production model in Chapter 4 and the Solow model in Chapter 5,...
According to both the production model in Chapter 4 and the Solow model in Chapter 5, there must be large differences in productivity across countries. Why does productivity differ across countries? Select all that apply. (a) Countries use different technologies. (b) The amount of capital differs across countries. (c) The educational level of workers differs across countries. (d) The number of workers differs across countries. (e) The extent to which property rights are protected varies across countries.
From Chapter 4 Case Study 2- An Introduction to Management Science- A Qualitative Approach to Decision...
From Chapter 4 Case Study 2- An Introduction to Management Science- A Qualitative Approach to Decision Making 14e Schneider's sweet shop specializes in homade candies and ice cream. Schneider produces its ice cream in-house, in batches of 50 pounds. The first stage in ice cream making is blending of the ingredients to obtain a mix which meets pre-specified requirements on the percentages of certain constituents of the mix. The desired composition is as follows 1. Fat 16% 2. Serum Solids...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT