Tutor Quora

RMET6053 Research Methods

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

RMET6053 Research Methods

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

RMET6053 Research Methods

0 Download3 Pages / 577 Words

Course Code: RMET6053
University: Greenwich School Of Management

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Question:
Why does the CVE-2017-0144 vulnerability occur.How is CVE-2017-0144 leveraged to perform the EternalBlue exploit? Prevention measures that can be taken to reduce/eliminate future events? 
Answer:

This paper highlights the reasons behind the occurrence of CVE-2017-0144 vulnerability in the Common Vulnerability and Exposure (CVE) catalogue. The following paragraphs describe the role of CVE-2017-0144 in the EternalBlue exploit. The measures that can be taken to prevent these attacks in the future are also described in the following paragraphs.
Common Vulnerability and Exposure is a catalogue of several known security threats that are divided into two categories- vulnerability and exposure. The vulnerability is any mistake in the software code that allows an attacker to access the entire system or network directly. However, exposure means indirect access to the system in case of any mistake in the code. CVE-2017-0144 is vulnerability in the Microsoft Server Message Block 1.0 (SMBv1) that is used by the ransom wares to infect systems or networks (Almukaynizi et al. 2017). It exploits the vulnerability of Server Message Block (SMB) that affects the Microsoft Windows System. The malicious code or software attempts to exploit the Server Message Block vulnerability when it is introduced into the Microsoft Window System. The file on the hard drive of the system is encrypted by a malicious software and it becomes inaccessible to the authorised user of the system. These ransom wares are spread through malicious attachments or other infected systems in the same Local Area Network (LAN).
EternalBlue is a term that describes the software vulnerability in the Operating System of Microsoft. The EternaBlue vulnerability is performed by exploiting the Server Message Block (SMB) of Microsoft version 1. SMB is a protocol for network file sharing that makes applications on the same network capable of reading and writing to the data or files on a computer. The EternalBlue vulnerability is denoted by CVE-2017-0144 in the catalogue of Common Vulnerability and Exposure. It occurs when the specially crafted codes or packets by the remote attackers are mishandled by the SMBv1 in the different versions of Microsoft Windows, as it allows the attackers to run arbitrary codes on the target systems or computers (Chaurasia 2018). The entire data or files of the systems that are connected to the same server can be accessed by unauthorised users if the hackers send the specially designed code to a Microsoft Server Message Block.
There are several measures that can be taken to reduce or eliminate the attacks in the future. The impact of latent vulnerabilities can be reduced if the internal vulnerability assessments are conducted to identify Microsoft Windows computer systems that are not patched with MS17-010 and this patch is applied on the affected systems. The users are required to update anti-malware software or endpoint protection tools to detect and remove ransom wares. The organisations are required to conduct security awareness plans and give them training about ransomware attacks. The users should not open attachments or links from unknown or suspected sources.  
It can be concluded from the above discussion that the CVE-2017-0144 is the vulnerability in the Microsoft Server Message Block 1.0 (SMBv1) that is used by the hackers to infect the target systems or computers. It can be reduced or eliminated by patching the systems with MS17-010.
References:
Almukaynizi, M., Grimm, A., Nunes, E., Shakarian, J. and Shakarian, P., 2017. Predicting cyber threats through the dynamics of user connectivity in darkweb and deepweb forums. ACM Computational Social Science. ACM.
Chaurasia, R., 2018. Ransomware: The Cyber Extortionist. In Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolutio

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.

E-mail

Yes, alert me for offers and important updates

Submit 

Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 3 pages

PAY 2 USD TO DOWNLOAD

*The content must not be available online or in our existing Database to qualify as
unique.

Cite This Work
To export a reference to this article please select a referencing stye below:

APA
MLA
Harvard
OSCOLA
Vancouver

My Assignment Help. (2020). Research Methods. Retrieved from https://myassignmenthelp.com/free-samples/rmet6053-research-methods/occurrence-of-cve-2017-0144-vulnerability.html.

“Research Methods.” My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/rmet6053-research-methods/occurrence-of-cve-2017-0144-vulnerability.html.

My Assignment Help (2020) Research Methods [Online]. Available from: https://myassignmenthelp.com/free-samples/rmet6053-research-methods/occurrence-of-cve-2017-0144-vulnerability.html[Accessed 18 December 2021].

My Assignment Help. ‘Research Methods’ (My Assignment Help, 2020) accessed 18 December 2021.

My Assignment Help. Research Methods [Internet]. My Assignment Help. 2020 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/rmet6053-research-methods/occurrence-of-cve-2017-0144-vulnerability.html.

×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}

×

Thank you for your interest
The respective sample has been mail to your register email id

×

CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.

Account created successfully!
We have sent login details on your registered email.

User:

Password:

Are you stuck with a complicated dissertation proposal? Do you need the right assignment help Australia to overcome such challenges? Take a smart call; choose MyAssignmenthelp.com for an all-inclusive assignment help on the go. We have roped in the best former professors having extensive knowledge of how to go about a dissertation proposal seamlessly. Order your paper today, and take home flawless proposals on time.

Latest Management Samples

div#loaddata .card img {max-width: 100%;
}

MPM755 Building Success In Commerce
Download :
0 | Pages :
9

Course Code: MPM755
University: Deakin University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answers:
Introduction
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…
Read
More

SNM660 Evidence Based Practice
Download :
0 | Pages :
8

Course Code: SNM660
University: The University Of Sheffield

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answers:
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Read
More
Tags:
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :
20

Course Code: BSBHRM513
University: Tafe NSW

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…
Read
More

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :
5

Course Code: MKT2031
University: University Of Northampton

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answer:
Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Read
More
Tags:
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :
7

Course Code: MN506
University: Melbourne Institute Of Technology

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Introduction
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Read
More
Tags:
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 

Next

Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

11174 Introduction To Management

Free Samples 11174 Introduction To Management .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} 11174 Introduction

Read More »