Vulnerability discussion

 Vulnerability discussion

Primary Task Response: Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas:

Hackers do not simply compromise an existing system, they follow a methodology, and in the end they compromise vulnerabilities somewhere in the environment. Your boss has asked you to describe how a hacker accomplishes this task. To help understand this, provide your input to the following:

  • Describe and define a vulnerability.
  • Describe and define an exploit.
  • Describe and define an attack.
  • Lastly, describe how all three of these concepts work together and lead to a compromised system.

Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:

  • What did you learn from your classmate’s posting?
  • What additional questions do you have after reading the posting?
  • What clarification do you need regarding the posting?
  • What differences or similarities do you see between your posting and other classmates’ postings?

For assistance with your assignment, please use your text, Web resources, and all course materials.

 

Order from us and get better grades. We are the service you have been looking for.