logo

(Solved) Information Security: Assignment

28 Pages7728 Words183 Views
   

Added on  2021-04-17

(Solved) Information Security: Assignment

   Added on 2021-04-17

ShareRelated Documents
Running head: INFORMATION SECURITY INFORMATION SECURITYName of the studentName of the UniversityAuthors note:
(Solved) Information Security: Assignment_1
INFORMATION SECURITY1Executive Summary With the rise and advent of popularity in various kinds of wireless devices, the number of smallenabled device has increase in due course of time. Mobile device is becoming more and moreused to people of various kinds of people. It can easily result in various threats which arevulnerable to malicious codes. Mobile devices heavily depend on open and public transmissionmedia. It provides a large number of features like email address, downloading of software andalso e-banking. With the increase in the capabilities of these device the impact and threat ofmalicious code have increased a lot.
(Solved) Information Security: Assignment_2
INFORMATION SECURITY2Table of ContentsIntroduction..........................................................................................................................3Literature Review................................................................................................................4Structure of botnet...........................................................................................................6Command and Control.....................................................................................................7Infection Method.............................................................................................................9Trigger Events...............................................................................................................10Solution for detection of malicious activity between phone and server............................10Distributed Denial of Service Prevention Methods.......................................................10Mobile Ad Hoc Network (MANET).............................................................................12Attacks.......................................................................................................................15Security......................................................................................................................17Theft of data...................................................................................................................18Phone Hijacking.............................................................................................................18Malicious code detection technique...............................................................................19Signature based detection..........................................................................................19Behavior Checking....................................................................................................19Integrity checker........................................................................................................19Conclusion.........................................................................................................................19References..........................................................................................................................21
(Solved) Information Security: Assignment_3
INFORMATION SECURITY3Introduction In the year of 2014 mobile malware completed ten years of existence. Cabir wasconsidered to be first mobile worm discovered in 2004. Mobile malware has been considered tohave the same evolution as the PC malware (Appala et al., 2015). This report mainly focused onemergence of bots for mobile phones and piece of malware which can easily control by a remoteentity. Command and Control (C&C) server or botmaster is used for performing various kinds offunction. A botnet is nothing but a collection of compromised computer comprised controls doneby a botmaster. Bots or compromised control can be easily used for various kinds of attacks likeDistributed denial of service (DDoS), identification of theft and lastly spamming. Most ofbotnets generally makes of command and control server which makes use of botmaster for issuesvarious kinds of commands to specific bots (Arora, Garg & Peddoju, 2014). Mobile applicationsare gaining large amount of popularity in the era of mobile and cloud computing. Most of thesensitive information is generally stored inside this kinds of mobile application like Facebook,various authentication tokens and browsing histories of chrome. However, there are certainnumber ways which can be used for private files from various application in an indirect way(Arzt et al., 2014). It is generally achieved by exploiting files in indirect manner by making useof trusted victims. In the coming pages of the report a literature review has been done on the variousmethods for detection of malicious activity between mobile phone and the server. It is generallyachieved by making use of command and control and by making use of MTM proxy. This papermainly discusses the problem that is attackers steal vital information without the consent ofclient. Possible solution for detection of malware activity is the analyzation of transmittedpackets between mobile phone and server.
(Solved) Information Security: Assignment_4
INFORMATION SECURITY4Literature Review Cryptolocker ransomware generally targets various kinds of Android platform which isused for deactivation of commands from its botmaster. In the first section of the conceptual andimplementation differences between computers and mobile botnets will be discussed. Platform of operation: According to Chou (2013), the platform for running botmastersand slaves is considered to be a difference between mobile and PC botnets. In the matter of PCmalware both of the botmaster and salve run on the same kind of platform whereas in the case ofmobile botnets the bot slave is generally mobile phone. Botmaster running on computers orphone is generally operated by an attacker. Connectivity: It is stated by Ding, et al(2014) that Mobile botnets are generallysubjected to connectivity of a mobile phone with a cellular network for communication with thehelp of cellular network for communication with Command and control (C and C) server.Whereas PC botnets are generally subjected to internet access of PC that is generally affected bynetworks faults and technical errors in the devices. This domain is generally considered to beleveled for both kinds of botnets. Lucrativeness: It is stated by Dua and Bansal(2014) that mobile devices generallyprovide better lucrative attacks because of fact that they are carried by various kinds of user. Itfocusses on providing large value of probability of having proper information from various kindsof information from audio and video recordings and cameras. It generally focusses on PC botnetswhich depend on uptime of device and availability of user. A key point to notice for mobilebotnets that their system counterparts they do not provide any kind of ability which can be usedfor location of victim in real time.
(Solved) Information Security: Assignment_5
INFORMATION SECURITY5Detection: It is stated by Falcone and Garro (2014) that Possible ways or methods fordetection of sign of infection generally exist in both mobile and PC botnets. Apart from thatmobile botnets address various kinds of risk of detection resulting from various kinds of mobilebills which can occur due to internet connection or any kind of SMS message in fixed amount orany kind of unusual number in the call history. Takedown: It is stated by Grymin and Farhood (2014) that Mobile botnets are generallyconsidered to be fair for taking down. All the cases addressed so far in the single point of takingdown that can be either a phone number, a sever and email associated with it. However due todevelopment of new variety with remotely upgraded Command and control, mobile botnets mayhave headed towards a new level of complexity for various kinds of PC botnets. This part mainly discusses Yxes malware for Symbian platform which is considered to befirst step for mobile botnets. In the year of 2009, Symbian malware known as Yxes wasdiscovered which focused on focused on forecast of mobile botnet. Internet access: According to Guido et al. (2013),the malware collected informationfrom various kinds of information from infected phones like serial numbers and subscriptionnumber and after that it is forwarded to remote server by fulfilling of requirement for variouskinds of qualification like bot client. SMS propagation: According to Guri et al., (2015), Malware generally affect the sentout message which contains the download link. After that the link is pointed to a copy of theworm. There are no doubts regarding the fact that remote copy of malware can be easilyupgraded by attackers which focus on the ability for listing various kinds of commands.
(Solved) Information Security: Assignment_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Botnet operations and communication
|12
|2233
|40

(PDF) Study of Botnets and their threats to Internet Security
|8
|1126
|478

Security threats Assignment PDF
|17
|5254
|133

The Assignment on Information Security
|12
|832
|36

Detecting Malicious Traffic between Server and Mobile Phones using MITM Proxy
|42
|15030
|110

Overview of Network Security Discussion 2022
|12
|2283
|21