Preview

Lab #9

Good Essays
Open Document
Open Document
650 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab #9
Course name and Number: ISSC 362 attack and security 1. When you are notified that a user’s workstation or system is acting strangely and log files indicate system compromise, what is the first thing you should do to the workstation or system and why? a. Disconnect from the network via unplugging the network interface and pull the power cord. Through doing this you can isolate the damage to the areas that it is located without the chances of it uploading data or changing the system during power down. 2. When an antivirus application identifies a virus and quarantines this file, does this mean the computer is free of the virus and any malicious software? b. No it does not. When the virus quarantines the file it puts it in a sandbox where it can’t affect the system. However, the virus program doesn’t necessarily detect other portions of the program. This will take analysis to determine if there is more. Also, the virus vault must be emptied in order to delete the actual files. Following this a thorough scan must be implemented in order to check the system for any changes that were made by the malicious software. 3. Where would you check for processes and services enabled in the background of you “student” VM workstation c. Through the system configuration setup. This can be reached through running msconfig command under the run dialog. Once inside you can see all running services, boot services, startup services, and system services. Another method of checking the running services is through the processes tab of the ctr+Shift+esc command. This will show all running processes and allow the user to shut them down. 4. Where would log files typically be kept on most Microsoft systems? d. Control panel/administrative tools/event viewer. Or C:/Windows 5. What is the SANS institute’s six step incident handling process.
Phase 1: Preparation
Phase 2: Identification
Phase 3: Containment
Phase 4: Eradication
Phase 5:

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1330 Unit 3 Quiz Essay

    • 5533 Words
    • 23 Pages

    | ____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.Answer…

    • 5533 Words
    • 23 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3110

    • 382 Words
    • 2 Pages

    Installing antivirus on workstations will lessen the chance of infections from virus but it will not completely eliminate.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mat 540 Quiz

    • 3391 Words
    • 14 Pages

    | Antivirus software can detect and eliminate viruses that are trying to enter your system. Answer…

    • 3391 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    To determine services that a computer is running and shut down services not being used to increase the security of the computer being scanned.(2)…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3 Assignment 1

    • 2755 Words
    • 12 Pages

    My firewall may be effective at blocking some attacks and offering a certain amount of protection. But a firewall does not guarantee that your computer will be attacked. In particular, a firewall offers little to no protection against viruses. However using a firewall in conjunction with other protective software and safe practices will strengthen resistance to attacks. Anti-virus software details vary between packages but basically it scans files on your computer’s memory for certain patterns that may indicate an infection, looking for signatures, or definitions, of known viruses. Authors for viruses are continually being updated and released, so it’s important you have the latest definitions installed so the software can tackle any threat new or old. Each virus software has its own method of response once it locates a virus, and the action may vary according to when it finds the virus either during an automatic or a manual scan. Most software produces a dialog box alerting you if it has found a virus and asks whether you want it to clean the file or remove it. Some software may attempt to remove the virus without first asking. A good user should familiarize themselves with the features so they know how to handle such a…

    • 2755 Words
    • 12 Pages
    Good Essays
  • Good Essays

    Install antivirus software, configuring it to run scans automatically at predefinedtimes and updating the definition files regularly.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    launches, the VDR decrypts the encrypted virus body back to its original form so the…

    • 639 Words
    • 2 Pages
    Good Essays
  • Good Essays

    MIS 320 Midterm

    • 3629 Words
    • 12 Pages

    Antivirus software is designed to check computer systems and drives for the presence of computer viruses and worms and often eliminates the malicious software, whereas antispyware software combats intrusive and harmful spyware programs. Often the software can eliminate the virus from the infected area. To be effective, antivirus software must be continually updated.…

    • 3629 Words
    • 12 Pages
    Good Essays
  • Satisfactory Essays

    unit 242

    • 658 Words
    • 3 Pages

    It automatically scans the computer for viruses, Trojans, worms, and spyware on a regular basis. It also protects the computer from suspicious files.…

    • 658 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    paper

    • 362 Words
    • 2 Pages

    whether that application starts as a service on the system or must be run manually.…

    • 362 Words
    • 2 Pages
    Good Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    What is Authorization and how is this concept aligned with Identification and Authentication? Authorization is a set of rights defined for a subject and an object; this concept is aligned with Identification and Authentication because these are the 3 steps to the access control process…

    • 718 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Module 4 Blank Study Guide

    • 2907 Words
    • 12 Pages

    1. How does the spreading of a computer virus compare to the spreading of human viruses?…

    • 2907 Words
    • 12 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 9

    • 616 Words
    • 3 Pages

    1. How does documented back-up and recovery procedures help achieve RTO? By having effective backup and recovery procedures you should have the necessary resources to restore systems from backups and a repeatable process that is known to succeed in achieving RTO. By documenting and implementing backup and recovery procedures, the process for recovery is much more efficient, helping with the time portion of RTO.…

    • 616 Words
    • 3 Pages
    Good Essays