Preview

Unit 2 Assignment 2

Satisfactory Essays
Open Document
Open Document
257 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 2 Assignment 2
Unit 2 Assignment 2: Microsoft Environment Analysis

1. The five vulnerabilities that exist for this LAN based workgroup are 2755801, 2501696, 2588513 2639658, 2659883. 2. Yes, the vulnerability that involves privilege elevation is 2639658 (Vulnerability in TrueType Font Parsing), but it is not a high priority. 3. 2719662
Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Apply the Microsoft Fix it solution that blocks the attack vector for this vulnerability. Disable Sidebar in Group Policy. Disable the Sidebar in the system registry.
2737111
Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Disable WebReady document view for Exchange.
2755801
Solution: Workaround refers to a setting or configuration change that would help block known attack vectors before you apply the update. Prevent Adobe Flash Player from running. Prevent Adobe Flash Player from running on Internet Explorer 10 through Group Policy on Windows 8 and Windows Server 2012. Prevent Adobe Flash Player from running in Office 2010 on Windows 8 and Windows Server 2012. Prevent ActiveX controls from running in Office 2007 and Office 2010. Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones. Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In order to try and correct the issue of the window of vulnerability (WOV), the LAN administrator needs to get the patch from Microsoft. Upon contact Microsoft has determined that it will take up to no less than three business days for the patch that we requested to be made available to us. Once we receive the patch we would need approximately several hours to download and then test out the patch to be certain that the patch will work and that this is the correct action to take to fix the Window of Vulnerability and seal the security breach on the Server Message Block server. Upon completion of testing the IT staff would need to hold a meeting to assess the quickest and most correct course of action to take after the patch has been installed to determine how to apply the patch apply it to the server and also to client computers depending on the process the IT staff decides to take it can take anywhere from one to three business days for the completion date to be met. If the IT staff were to work around the clock for overtime in shifts and the security breach was reported on a Friday with three days for the patch to be made and a week to troubleshoot and test the patch.…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    One common vulnerability is the lack of or outdated antivirus software. We get the popup alerts and click it away, because that alert is so annoying. But what must be realized is that annoying popup is a warning alert telling the user that the local workstation or network has a weakness that needs to be addressed.…

    • 167 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Answer: 2846338 involves privilege elevation, Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 10 Assignment 1

    • 344 Words
    • 2 Pages

    * The onsite updates the responsibility of the onsite IT team, and ultimately the IT supervisor. The responsibility of the restore includes the same people plus the OK from management. All parties need to be kept updated with current…

    • 344 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    M6 Assignment

    • 387 Words
    • 2 Pages

    1. Because it displays all elevation prompts on the secure desktop, which can receive messages only from Windows processes which prevent any active Malware to continue into the secure desktop.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2 Instructions

    • 389 Words
    • 2 Pages

    Microsoft Common Vulnerability and Exposures (CVEs) are addressed through security advisories with a corresponding advisory ID. Other CVE sources attach a CVE ID to advisories. Go through the archive of Microsoft Security Advisories at http://technet.microsoft.com/en-us/security/advisoryarchive…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1330 Unit 1 Essay

    • 601 Words
    • 3 Pages

    This attack works by enticing a victim to open a malicious web page. Once a user opens the web page it gives the attacker the ability to execute remote code on the victims computer. Since this is a browser based attack, it gives the hacker potentially more targets than relying on a plugin that may not get installed. (Symantec Corporation,…

    • 601 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Unit 6 Assignment 2

    • 878 Words
    • 4 Pages

    Without going into details regarding the theory of project risk management we present still, the definition of this concept as it is proposed by the Project Management Institute professionals who, in The Project Management Body of Knowledge Guide, [Duncan, W., R.,…

    • 878 Words
    • 4 Pages
    Good Essays
  • Better Essays

    UNIT 2 ASSIGNMENT 1

    • 1061 Words
    • 5 Pages

    4. According to this chapter, which of the following concepts happens in a modern-day, end-to-end voice call between two home telephones in the United States? (Choose two answers.)…

    • 1061 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    unit 242

    • 658 Words
    • 3 Pages

    Internet security can also be altered if needed. When loading up internet explorer, click on tools and open ‘internet options’ on the drop down menu, select security on the tabs and a box like this will appear:…

    • 658 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 4 assignment 2

    • 303 Words
    • 2 Pages

    After research and careful consideration of some of the other policies listed by other companies such as AT&T, Sprint, T-Mobile, and Verizon Wireless, Richman Investments has come up with the an acceptable use policy (AUP).…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 3

    • 288 Words
    • 1 Page

    Data classification policy is important for securing data from risks, which includes unauthorized users, modification, disclosure, access, use, and removal. This is to ensure protection on data assets from unauthorized users. Data must be maintained in a secure, accurate and reliable manner and be available for authorized use. In order to implement security measures, the data must be classified into categories like; confidential, restricted, and public. Confidential and restricted will be required some sort of access mechanism to authenticate anyone who wants to access any classified documents. In order to construct a Classification policy, one must know what type of data are available, where they are located, what type of access levels are implemented and what protection level is implemented and does it adhere to compliance regulations.…

    • 288 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    vulnerability is a weakness which allows hacker to attack on system. Nessus is a vulnerability scanner that offers many features to help assess the security of control system networks, devices, servers and workstations.…

    • 692 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Canadian Tire Case

    • 656 Words
    • 3 Pages

    There are many options the company can take to resolve this issue. The first option is to continue working on the project in the manner it is now. It will eventually get done and it will not put a strain or pressure on current users. However, because this is a reactionary form of BI Maturity, much time is spent resolving issues and has little time to focus on the future of the project.…

    • 656 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS4560 Hacking

    • 675 Words
    • 2 Pages

    There is currently not a fix or solution for the weakness/vulnerability. The best that has been presented are mere suggestions to implement. There are currently only (2) suggestions, those are, 1. Do not use MD5 algorithm, Software developers, Certification Authorities, website owners, and users should avoid using the MD5 algorithm in an capacity, it should be considered cryptographically broken and unsuitable for further use.…

    • 675 Words
    • 2 Pages
    Good Essays