Preview

Microsoft Environment Analysis Essay Example

Satisfactory Essays
Open Document
Open Document
360 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Microsoft Environment Analysis Essay Example
Microsoft Environment Analysis

Writing Assignment

1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.
a. 2401593 CVE-2010-3213
b. 2264072 CVE-2010-1886*
c. 980088 CVE-2010-0255
d. 975497 CVE-2009-3103
e. 98343 CVE-2010-0817*

2. Do any vulnerabilities involve privilege elevation? Is this considered a high priority issue?
a. Only two from the five listed in question one are privileged elevation and identified by the asterisk alongside the CVE number. They are of importance but not considered a high priority issue as asked.

3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.
a. Advisory Number: 977981
a.i. Solution: This security update resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights
b. Advisory Number: 979352
b.i. Solution: This security update resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
c. Advisory Number: 954157
c.i. Solution: The update also removes the ability for this codec to be loaded when browsing the Internet with any other applications. By only allowing applications to use the Indeo codec when the media content is from the local system or from the intranet zone, and by preventing Internet Explorer and Windows Media Player

You May Also Find These Documents Helpful

  • Powerful Essays

    If you were able to surf the web but now you can’t, this fix is for you.…

    • 856 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”?…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab10 worksheet

    • 1151 Words
    • 5 Pages

    The director of IT at Contoso, Ltd. wants to prevent the company’s Windows 7 users from modifying the default Internet Explorer configuration by installing additional software, such as add-ons and accelerators. She also wants to ensure that the company intranet pages, designed several years ago for a previous IE version, display properly in IE8. Finally, the director wants to ensure that all Internet browsing activity on the network is logged for later examination. Your job is to configure the appropriate Group Policy settings to implement these requirements in your GPO.…

    • 1151 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    In this assignment we are asked to identify the major threats and security concepts from a whitepaper located on the internet: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf. This report stated that: “There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec in 2009.” These threats are identified as:…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    10. Explain a scenario where an organization can use MBSA, WSUS and Windows Update in a combined strategy to maintain systems across an enterprise up-to-date.…

    • 952 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Solution: The update also removes the ability for this codec to be loaded when browsing the Internet with any other applications. By only allowing applications to use the Indeo codec when the media content is from the local system or from the intranet zone, and by preventing Internet Explorer and Windows Media Player from launching the codec at all, this update removes the most common remote attack vectors but still allows games or other applications that leverage the codec…

    • 272 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    3. Which application is used for Step 2 in the hacking process to perform a vulnerability assessment scan?…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 3

    • 1041 Words
    • 5 Pages

    9. Which security zone used in Internet Explorer provides the most elevated set of privileges?…

    • 1041 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Testing and monitoring security controls can come in different factors. Monitoring security is by far important because you need to know what’s going on before you can announce it. Networking abuse is by far the biggest baseline anomaly. For employees who have access to the internet, the network can be used to stream media, to access social websites and to download unauthorized software or free software which has vulnerabilities a long with that.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Web-based attacks – the increasing pervasiveness of Web browser applications along with increasingly common, easily exploited Web browser application security vulnerabilities has resulted in the widespread growth of Web-based threats. Attackers wanting to take advantage of client-side vulnerabilities no longer need to actively compromise specific networks to gain access to those computers. Instead, they can focus on attacking and compromising websites to mount additional, client-side attacks.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Since this information pertains directly to the application of web-based information security by Core & Main, the statement was not modified and/or paraphrased, in an effort to leave the official words and/or thoughts of the company unaltered and unmodified.…

    • 863 Words
    • 4 Pages
    Good Essays