MyAssignmenthelp

Get Help From World's No.1 Online Tutoring Company

Get Online Tutoring through WhatsApp

Question & Answers

SIT182 Real World Practices for Cyber Security Task 2.1P

Overview of the task

In this task you will review two cybersecurity threats and submit a document including your answers to a few questions.

Please note the following:

  • You will need to use references to support your answer – as detailed in Task 1.3. Please note that we do not have any restriction on referencing style you can use any of Deakin’s approved referencing formats including APA, Chicago, Harvard, and IEEE

– more details available on https://www.deakin.edu.au/students/studying/study- support/referencing. Please list your references below each question. You do not need to include references that you have not referred to in your answer directly (i.e., we do not need a bibliography).

  • This is not a report assignment. You need to submit concise answers. Excessively short and long submissions will not be

Task Details

  1. Investigate about `Y2K crisis’, and answer the following questions:

 

  1. Was Y2K a computer security problem – justify your answer briefly? (refer to Week 1’s lecture to understand what we define as a computer security problem)
  2. What was the impact of Y2K on people’s life?
  3. What caused Y2K? (technical discussion expected)

Note: Aim for short concise answers. You can copy/paste each question in your answer document and include your answer just below it. 400-500 words should be enough, but you can go reasonably beyond if you need to.

  1. Investigate about ` ILOVEYOU’ malware, and answer the following questions:

 

  1. What type of malware is this threat – justify your answer? (Refer to Week 2’s lecture for different type of malware)
  2. What is a malware `payload’, and what payload is used in this malware? (technical discussion expected)
  3. Variants of this malware were released. Did the `Payload’ used for this malware also change? (if no, then how was this malware still effective?)
  4. The creators of this malware were identified but set What was the reason?

Note: Aim for short concise answers. You can copy/paste each question in your answer document and include your answer just below it. 250-300 words should be enough, but you can go reasonably beyond if you need to. 

Submission Details

Convert your document to PDF and upload on OnTrack. There is no specific resource for this task. All you need to do is to include answer to questions available in this task.

Expert's Answer

Investigate about `Y2K crisis’, and answer the following questions:

In order to be able to identify if Y2k was a computer security problem or not, it is important to understand what Y2k, actually was. Y2K had become a bit of concern stemming from the clash of the upcoming year of 2000.

For Viewing Complete Solution

Chat with our Experts

Want to contact us directly? No Problem. We are always here for you

Professional

Online Tutoring Services

17,148

Orders Delivered

4.9/5

5 Star Rating

748

PhD Experts

 

Amazing Features

Plagiarism Free

Top Quality

Best Price

On-Time Delivery

100% Money Back

24 x 7 Support

Ask a New Question
*
*
*
*
*

TOP

Connect on WHATSAPP: +61-416-195006, Uninterrupted Access 24x7, 100% Confidential

X