Go Back   HowtoForge Forums | HowtoForge - Linux Howtos and Tutorials > Other Forums > Smalltalk

Do you like HowtoForge? Please consider supporting us by becoming a subscriber.
Reply
 
Thread Tools Display Modes
  #1  
Old 19th November 2008, 22:59
bdh734 bdh734 is offline
Junior Member
 
Join Date: Sep 2008
Posts: 2
Thanks: 1
Thanked 0 Times in 0 Posts
Send a message via MSN to bdh734 Send a message via Yahoo to bdh734
Default Security and Theories

I had an exam in college that asked the following question:

A person sends a worm to an unprotected computer, this is an example of a/an

A) Threat
B) Exploit
C) Vulnerability
D) Threat Agent

I picked Threat and was marked wrong. They said the answer was
Exploit. I was able to successfully argue that it was a threat by stating
that until the worm is executed, it is a threat and would then exploit
the system only if it was successful. Now their argument was by
definition, the internet is a threat and it is up to the user to
protect. Therefore, the worm is designed by nature to be an exploit.
But if we look into that theory, then the internet would become a
threat agent. Whereas a way to deliver all of the above.

Question is....
Am I right with my theory?

Please advise and explain.

Thanks!
__________________
Hey Google................Buy Me!
Reply With Quote
Sponsored Links
  #2  
Old 19th November 2008, 23:26
edge edge is offline
Moderator
 
Join Date: Dec 2005
Location: The Netherlands
Posts: 2,033
Thanks: 261
Thanked 149 Times in 130 Posts
Default

I think that you also need to know (1) what OS the worm was made for, and (2) what OS the unprotected computer was using!

If the worm was made for Windows, and the unprotected computer's OS was Linux, than none of the answers was correct :-)
__________________
Never execute code written on a Friday or a Monday.

Last edited by edge; 19th November 2008 at 23:30.
Reply With Quote
The Following User Says Thank You to edge For This Useful Post:
bdh734 (19th November 2008)
  #3  
Old 19th November 2008, 23:42
bdh734 bdh734 is offline
Junior Member
 
Join Date: Sep 2008
Posts: 2
Thanks: 1
Thanked 0 Times in 0 Posts
Send a message via MSN to bdh734 Send a message via Yahoo to bdh734
 
Default

Yes I agree with that. But for giggles, lets says winblows. I just need to know if my theory that I spent 45 minutes in class, in front of 50 other students arguing about was really correct.

Hint: This college has a notch for sending people out the door with M$ stamped on their head.
__________________
Hey Google................Buy Me!
Reply With Quote
Reply

Bookmarks

Tags
exploit, secuirty, theories, threat, worm

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT +2. The time now is 08:08.


Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2014, vBulletin Solutions, Inc.