Question

In: Computer Science

Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!! Question:   ...

Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!!

Question:    Using a Web browser, visit securityfocuscom. What is Bugtraq, and how would it be useful? What additional information is provided under the Vulnerabilities tab?
Using a Web browser, visit certorg. What information is provided there, and how would it be useful? What additional information is provided at cert org/csirts/?

Solutions

Expert Solution

I gone through the articles and written a brief summarized answers for the questions. Please feel free to make any corrections if required.

Thank You

BugTraq : This is a mailing list where we can subscribe for newly detected threats and vulnerabilities and their solutions if proposed.

Exploits, fixes, future plans of computer security and any security breach related vulnerabilities can be posted to bugtraq.

All the bugtraq mailing lists are moderated and it has currently 31 mailing lists.

Verification of email is necessary for the bugtraq mailing list subscription.

Bugtraq is used to keep up with the vulnerabilities and experts trying to fix them. This is a good discussion forum or platform to post the new threats found and fix them.

Vulnerabilities :

This tab contains the information of all the vulnerabilities. Search methods provided using vendor, title , version and CVE (Common Vulnerabilities and Exposures)

Each vulnerability mentioned there, has info, discussion , exploit, solution and references of each vulnerability.

Info : This consists of the Bugtraq ID , class, cve, remote, local , published, updated, credit and vulnerable environment details

Discussion: Brief discussion about the vulnerability is mentioned in this tab.

Exploit: Exploit session details and exploit environment will be mentioned in this tab.

Solution: This tab consists of solution found.

References: This consists the proof of the exploit details .

CERT

This is software engineering institute division where cyber security is at most priority. This provides the CERT insider vulnerability assessment tool which can be used by organization for assessment purposes of software. This group consists of security analysts and others to manage the research security vulnerabilities. Cert is connected with Carnegie Mellon University to enhance the diversity of research areas. This helps to patch the vulnerabilities effectively and researchers participate in patching as all diversified group focus on the security breach. Effective maintenance of the software can be done with varied groups of researchers focus on each vulnerability and fixing the issues as soon as possible.

CERT provides easiest way to assess the software with all the testing environment developed in the tool provided by cert.

CSIRT s : Computer Security Incident Response Teams

This teams are managed by the CERT . When organizations, governments face a vulnerability it has to be patched as soon as possible with best effective methods. CSIRTs team consists of the diverse research fields team for security analysis and handle the vulnerability at best effort.

This group is expert at incident management and defend against cyber attacks.


Related Solutions

Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!! Question:...
Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!! Question: Using a Web browser, search for “incident response template.” Look through the first five results and choose one for further investigation. Take a look at it and determine if you think it would be useful to an organization creating a CSIRT. Why or why not?
Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!! Question:...
Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!! Question: Using a Web browser, identify at least five sources you would want to use when training a CSIRT. Using a Web browser, visit mitre org. What information is provided there, and how would it be useful?
Please don't copy and paste from the internet. Thank you - What event will cause the...
Please don't copy and paste from the internet. Thank you - What event will cause the sender to initiate fast retransmit when using TCP? - Describe briefly the relationship between the round trip time (RTT) observed between a sender and a receiver and the retransmit timer used in TCP - Describe briefly the basic difference in service provided by an email server using POP3 protocol compared to an email server using IMAP protocol. Please don't copy and paste from the...
Please don't copy and paste answers from several sources. Write in your own words! Do you...
Please don't copy and paste answers from several sources. Write in your own words! Do you feel teams help or hurt creativity? Give specific examples. How should you handle a freeloader (someone not willing to do their share of the work) on a team where you are a member? Be specific. For an organization where you have worked, list three ways the organization helped you do your job. (This can be any type of organization if you have never worked.)...
DO NOT PLAGIARIZE, use outside sources, copy and paste, use other solutions that are on here....
DO NOT PLAGIARIZE, use outside sources, copy and paste, use other solutions that are on here. Please use your own words. How do you use the scientific method in your everyday life. At first this may seem strange, since you don't think that you use the scientific method at all. But by understanding the terms (like hypothesis, prediction, experiment, variables, controls, data gathering, and analysis), you should be able to relate them to something that you do. For example, some...
**** PLEASE DO NOT COPY AND PASTE FROM ANOTHER SOURCE BECAUSE THE ANSWER IS INCOMPLETE********* Introduction:...
**** PLEASE DO NOT COPY AND PASTE FROM ANOTHER SOURCE BECAUSE THE ANSWER IS INCOMPLETE********* Introduction: IN C PROGRAMMING For this assignment you will write an encoder and a decoder for a modified "book cipher." A book cipher uses a document or book as the cipher key, and the cipher itself uses numbers that reference the words within the text. For example, one of the Beale ciphers used an edition of The Declaration of Independence as the cipher key. The...
Note: Plagiarism is strictly prohibited please do not copy from internet please . Question 01: Explain...
Note: Plagiarism is strictly prohibited please do not copy from internet please . Question 01: Explain with examples what is the positive and nominative Economics (150 to 200 words) . Note: Plagiarism is strictly prohibited please do not copy from internet please
Answer the below question in your own words please do not copy and paste. 4. What...
Answer the below question in your own words please do not copy and paste. 4. What is an industry that is in the maturity phase of the life cycle? How intense is the competition? 5. What is an example of an industry in the decline stage? What strategies are the current firms following? 6. Can you think of a firm that has completed a successful (or unsuccessful) turnaround?
In context of Australia ; Please answer in detail and do not copy paste for any...
In context of Australia ; Please answer in detail and do not copy paste for any other source 1)A client has receipts for $50.00 from donations provided to door to door charity collectors. Can the client claim a tax deduction for this amount? Why? 40–50 words 2) A client wants to claim $300 for work-related expenses and says they might not have spent that amount but because it does not need to be substantiated they will still make the claim....
Note: Plagiarism is strictly prohibited please do not copy from internet . Question 1. Game theory...
Note: Plagiarism is strictly prohibited please do not copy from internet . Question 1. Game theory is the study of multi- player decision making in situation where the choices of each player may affect the pay-offs received by other players. Arrange how many types you can categorised Game Theory. (200 words) . Note: Plagiarism is strictly prohibited please do not copy from internet
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT