Preview

Week3 Hacking

Good Essays
Open Document
Open Document
391 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week3 Hacking
1. Workstation and Desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organization implement to help mitigate the risk caused from viruses, malware, and malicious software?

a. Up to date anti-virus software and updated firewall.

2. Your employees e-mail file attachments to each other and externally through the organization’s firewall and Internet connection. What security countermeasures can you implement to help mitigate the risk of rogue e-mail attachments and URL web links?
a.

3. Why is it recommended to do an anti-virus signature file update before performing an anti-virus scan on your computer?

a. So you have the most up to date anti-virus signature
4. Once a file is found malicious on your computer what are the default settings for USB/removable device scanning?What should organization do regarding use of USB hard drives and slots on existing computers and devices?

5. If you find a suspect executable and wish to perform “dynamic analysis” what does that mean?

6. What is a malware and malicious code sandbox? How you test the

7. What are typical indicators that your computer system is compromised?

a. System crashes
b. Waiting for programs
c. Antivirus is disabled
d. Desktop icons have changed
e. Pop-up ads

8. What is a rootkit and what threat does it incur on systems?

a. Rootkit is association with malware. Once installed, it becomes possible to hide the intrusion as well as to maintain privileged access. The key is the root/Administrator access. Full control over a system means that existing software can be modified, including software that might otherwise be used to detect or circumvent it.

9. What security countermeasures are available to combat against root kits and malicious software?
a. Install a good antimalware solution on

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    2. List three suggestions to harden SMTP server security. Backup your Exchange server periodically, Audit your Exchange server, and Digitally sign and Encrypt your Email.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has antivirus and malware protection installed on them. Laptops are very vulnerable for loss or theft, so all company laptops should have an encrypted hard drive so that if they are stolen, the data contained on them is not recovered by anyone but the owner.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    For the LAN domain, we need to have annual training about fictitious emails. Most users know not to access unknown emails when on our system but a brief training course will assist in this matter. Also, adding spam filters will help rid of most junk email, so there is less risk of employees opening emails which may contain malware. In the LAN-to-WAN domain, we need to power off FTP servers running then switch over to the use of secure FTP servers so that only users allowed on our system can access them.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has to have antivirus and malware protection installed on them. Express strict access control polices and standards. And mandate annual security awareness training for all employees…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Apply email server and attachment antivirus/malware and email quadrating for unknown file types. Disable for ping, probing, and port scanning on all exterior IP devices. Denying of outbound traffic using source IP addresses. Apply file transfer monitoring, scanning and alarming for unknown file types. Web Surfing should be monitored by filtering out any unknown IP address with trusted cites. Apply domain-name content filtering at the internet entry/access point as well.…

    • 313 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    L. Use workstation antivirus and malicious code policies, standards, procedures, and guidelines. Enable an automated antivirus protection solution that scans and updates individual workstations with proper protection.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    The PWS: Win32/QQpass.GR is a security threat so far as computer systems are concerned and the PC users need to take adequate steps to ensure that such errors are got rid of. There are a number of software tools that are available online and the user needs to choose the one that PWS: Win32/QQpass.GR removal tool which is effective in securing the PC systems.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It is a common sense that systems and networks should be protected from the damage caused by Trojans, viruses, and Worms. Practices that can help to prevent infection include these:…

    • 546 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    lab 2

    • 398 Words
    • 2 Pages

    3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity?…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    | Describe the security issues that may threaten system performanceThe possible threats to system performance may be: unwanted e-mail (‘spam’), malicious programs (including viruses, trojans) and hackers. Security precautions can be taken beforehand such as use of access controls. We can configure anti-virus software, adjust firewall settings, adjust internet security settings; backup; store personal data and software safely; treat messages, files, software and attachments from unknown sources with caution; download security software updates.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    homework 1

    • 454 Words
    • 2 Pages

    Enable content filtering and antivirus scanning at the entry and exit points of the Internet. Enable workstation auto-scans and auto-quarantine for unknown file types.…

    • 454 Words
    • 2 Pages
    Satisfactory Essays