StudentShare solutions
Triangle menu

Do not need to divide it - Coursework Example

Not dowloaded yet

Extract of sample
Do not need to divide it

(CVE-2003-0352, 2003) On knowing about the identification of this vulnerability in its primary product, Microsoft released a bulletin with a patch to plug the hole in the system. It did turn out to be successful and Microsoft released it through the "Microsoft Security Bulletin MS03-026”. On the release of it, Microsoft recommended all of its Windows users to immediately install the patch so that any further severe damage could be prohibited. The severity of the threat depends on the impact of the exploitation made on this vulnerability. (Microsoft Security Bulletin MS03-026 2003) The report details about the technical specifications of the vulnerability, its severity level if it is exploited in a Windows operating system, the methods and details about how it is exploited and the consequences that it could lead to a system. The report also aims to provide details on methods that could be used as mitigation processes in solving this vulnerability. ...
(Reuvid 2004) The severity level of threats that could be experienced with this vulnerability was very critical. Most of the networking systems depended on the remote connectivity that was capable in Windows with the help of these interfaces. As a result, critical business functions that completely depended on Networking came under severe threat. The versions of Windows that were affected by this vulnerability includes 2000, NT, 2003 and even Windows XP. More severe consequences were faced by those systems, which did not have a proper firewall system. Before gaining details on the vulnerability and how it is exploited, it is mandatory to know about the protocols that have been used as the medium of access for the vulnerability exploiters. RPC and DCOM protocols RPC - Remote Procedure Call as defined by Microsoft is, "a protocol used by the Windows operating system. RPC provides an inter-process communication mechanism that allows a program running on one computer to seamlessly execute code on a remote system. The protocol itself is derived from the Open Software Foundation (OSF) RPC protocol, but with the addition of some Microsoft specific extensions”. (Microsoft Security Bulletin MS03-026, 2003) The Distributed Component Object Model also called as the DCOM protocol allows for a seamless communication across several networks for multiple software accessories. The result of which is a direct communication which is uninterrupted and can be easily established across networks that are using different transport mediums. Examples of such network transport protocols include the universally accepted Hyper Text Transfer Protocol – HTTP. ...Show more

Summary

Author Name Instructor Name Date CVE-2003-0352/MS03-026 Introduction The aim of the report is to examine the common vulnerability that was exposed in 2003 in Microsoft Windows Operating system. Common Vulnerabilities and Exposures (CVE) provides the common vulnerabilities that affect a system…
Author : ublick
Do not need to divide it essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the coursework on your topic
"Do not need to divide it"
with a personal 20% discount.
Grab the best paper

Related Essays

Do not need to divide it
This connectivity is established as they share a common database. The common database includes an account object which controls the internal database. This account object resides in the domain container. The role of domain depends on the situation in which it is used.
8 pages (2000 words) Coursework
IT security
nal data and information. It secures its confidentiality, accessibility and reliability. The role of information security for allowing access to the stored data and information on computer databases has augmented significantly over the past few decades. Additionally, a lot of businesses now store more and more customers and business data on computer systems that was not seen formerly.
10 pages (2500 words) Coursework
Financing the Short Term Obligations of The Business
They are used to cushion for cash flow or secure liquid funds in the short run of the business. A comparison of Mark & Spencer and Morrison Company is analyzed below for liquidity and management of working capital. Modes of short term financings used by these companies are also assessed.
5 pages (1250 words) Coursework
The Wasp Factory and We Need to Talk About Kevin
Lain Banks, published novel The Wasp Factory in the year 1984. Banks narrated his novel in a person perspective where a sixteen year old Frank Cauldhame describes his childhood that reminds him of evil things he committed in that tender age (Banks, 1998; p. 25).
6 pages (1500 words) Coursework
I need you to decide a topic, then I need to talk with my module tutor to change it
The reasons behind highly technology enabled lifestyle are advancement of communication technology and rapid growth of internet technology for last decade. This makes customer informative and aware of the sellers and there offerings and make them always hungry for better upgraded and hi-tech products and services.
12 pages (3000 words) Coursework
Course assignment, question 3-5-8, need assisance
The target language for my class will be learning of vocabularies on popular hobbies. Since they already know adverb of frequency, question formation, tenses, and sentence structure, they will use hobbies to answer questions like why they like the hobbies, when they
3 pages (750 words) Coursework
Financing the Short Term Obligations of The Business
Modes of short term financings used by these companies are also assessed. Trade credit – this is also referred as suppliers’ credit, ledger credit or open book account. It is needed when commercial
5 pages (1250 words) Coursework
IT Infrastructure
Client-server infrastructure is an infrastructure type in which a server is used to host, deliver and manage a number of services and resources that the client needs. In particular, the server has the duty to house
4 pages (1000 words) Coursework
Lecture: Problem Solving For Leaders_Topic: Need For Closure
In the class group work, the need for closure was effectively applied in the recognition of the fact that task reflexivity was a core component of the effectiveness of the team in solving problems (Gebert, Boerner & Kearney 2010.p.593-608). This is
5 pages (1250 words) Coursework
Discuss at least one conceptual idea, model or theory in respect of your topic area and evaluate it using case study material
Even though the Australian Government have used sustainability in terms of policy and planning both at national level and state level, it has been heavily criticised for its economic and marketing focus when it comes to the policy of tourism that has been at the
12 pages (3000 words) Coursework
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation