Preview

nt2580 unit 2 assignment 1

Satisfactory Essays
Open Document
Open Document
391 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
nt2580 unit 2 assignment 1
In order to try and correct the issue of the window of vulnerability (WOV), the LAN administrator needs to get the patch from Microsoft. Upon contact Microsoft has determined that it will take up to no less than three business days for the patch that we requested to be made available to us. Once we receive the patch we would need approximately several hours to download and then test out the patch to be certain that the patch will work and that this is the correct action to take to fix the Window of Vulnerability and seal the security breach on the Server Message Block server. Upon completion of testing the IT staff would need to hold a meeting to assess the quickest and most correct course of action to take after the patch has been installed to determine how to apply the patch apply it to the server and also to client computers depending on the process the IT staff decides to take it can take anywhere from one to three business days for the completion date to be met. If the IT staff were to work around the clock for overtime in shifts and the security breach was reported on a Friday with three days for the patch to be made and a week to troubleshoot and test the patch.
The Window of vulnerability would be close to two weeks of time where their system can breached again and my recommendation if I were the administrator to remedy this gap of time I would attempt to have around the clock staff working on this in order to prevent further breaches of security until the Window of Vulnerability is closed off and made to be secure and available for public use again. The IT staff would have to be on board to work around the clock to correct this gap in security as fast possible the administrator should ask for volunteers to avoid rocking the boat and upsetting his/her IT staff. In my opinion this would be the best course of action to close the security gap as soon as possible and it would provide your staff with overtime if they want to take that opportunity but also

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 1 Assignment

    • 634 Words
    • 3 Pages

    The skin is an organ composed of three anatomical layers: epidermis, dermis, and hypodermis. These anatomical layers together function to provide the body with a protective barrier, body temperature regulation, sensation, excretion, the outer layer of skin…

    • 634 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT1310 Unit 1 Assignment 1

    • 4837 Words
    • 20 Pages

    In order to get some statistical data about the number of formula 1 crashes and their causes, we randomly picked up 1 race from each year starting from 1960 up till 2013, then extrapolated results to the respective entire year, and then calculated average numbers. Based on those figures we compiled the table below.…

    • 4837 Words
    • 20 Pages
    Good Essays
  • Satisfactory Essays

    There are two very important tools to use in Networking. They are Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP). These help keep your Network organized while building it. A DNS is a system used to name computers and network services that is organized into a hierarchy of domains. It can help locate computers and services through user names. Dynamic Host Configuration Protocol allows a server to automatically assign IP addresses to a computer from a certain range of numbers configured for that network. These two tools work as the foundation for IT-Management.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 1 Assignment

    • 987 Words
    • 4 Pages

    Layer 5: The session layer...This layer sets up, coordinates, and terminates conversations, exchanges, and dialogs between the applications at each end. It deals with session and connection coordination.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The software will be presented in such a way that it is both visually appealing and easy for the user to navigate through the application.…

    • 612 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    To recap, the security breach was reported on a Friday. On Monday, looked on Microsoft’s website to see when the patch would be released, and it indicated that it would take 3 days for it to be available. Counting Monday, 3 days would be, Wednesday. Depending on the time that the patch is released on Wednesday, would need an additional 2 days to download and test the patch before deploying, if early Wednesday, then Thursday to test. But if it comes late Wednesday, then it would take Thursday and Friday to test. Then that would leave the weekend, if the IT staff would work on the weekend. But if not, then it is going to restart on Monday and complete on…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? ( choose two answers)…

    • 957 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Brute Force - The intruder attempts to gain access to a server by guessing a user password (usually the root administrator) through the SSH server, Mail server, or other service running on your system. Brute force detection software will alert you when multiple failed attempts to gain access are in progress and disable access from the offending IP address.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1310 Unit 2 assignment

    • 475 Words
    • 2 Pages

    RBOCS- Regional Bell operating company (RBOC) is a term describing one of the U.S. regional telephone companies (or their successors) that were created as a result of the breakup of American Telephone and Telegraph Company (AT&T, known also as the Bell System or "Ma Bell") by a U.S. Federal Court consent decree on December 31, 1983. The seven original regional Bell operating companies were Ameritech, Bell Atlantic, BellSouth, NYNEX, Pacific Bell, Southwestern Bell, and US WEST. Each of these companies owned at least two Bell operating companies (Bell operating company). The BOCs were given the right to provide local phone service while AT&T was allowed to retain its long-distance service.…

    • 475 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 361 Words
    • 2 Pages

    According to the standard account, true belief is not sufficient for knowledge. It states that knowledge requires, not only that our beliefs be true, but that we have good reasons for believing them to be true. In standard account, knowledge is justified true belief.…

    • 361 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    100 NT 2580 U2A1

    • 465 Words
    • 2 Pages

    Since we already know that the server software manufacturer detected the hole the day before, and that a new patch will be available in three days but the LAN administrator needs at least a week to download the software, test it, and then install the patch, then we can calculate that the approximate window of vulnerability will be about 8 days at the very minimum. In this particular case, we do not know the specific time or day in which this occurs. To explain, further, we’ll use a made up day and time frame.…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 468 Words
    • 2 Pages

    Main Reading: Solomon, M.R. (2011) Consumer behaviour; buying, having and being, 9th edn. New Jersey: Pearson Education Inc…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Scenario Three

    • 791 Words
    • 4 Pages

    There are steps that the IT department could have taken to avoid the situation that occurred. There should have been policies in place to ensure that antivirus/malware software was installed on the computer before it was allowed to connect to any network. A machine build checklist could be implemented to where after a computer is initially setup with appropriate operating software, all relevant applications needed would then be installed, including the antivirus software. The endpoint protection software could be installed in a standalone mode if the system being deployed was not going to be part of the larger domain network or if it was going to be used for short term testing. Otherwise it could be deployed from a central management server. It would at the very minimum have that protection on it. Most antivirus vendors have auto update features in their software so that in the event the virus definitions become outdated the software automatically checks in to download the latest definitions.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    When a problem occurs, it is the responsibility of the computer security manager to carefully take the required steps to identify and resolve the security issues.…

    • 525 Words
    • 3 Pages
    Good Essays