Preview

thesis

Good Essays
Open Document
Open Document
2423 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
thesis
What services were attacked on the IIS server?
FTP
Remote Login Services
How many failed logins were detected?
17
Between what time and what time did the attacks occur?
19 March 2014 @ 2002 – 14 May 2014 @ 1925
What options are available to prevent brute force authentication attacks in a Windows Based domain?
Restricting the amount of login attempts that a user can perform
Blocking a user’s IP address after multiple failed login attempts
Monitor your log files for suspicious login attempts.
Require passwords to be changed after a certain number of days.
Implement password history
Implement password complexity
What is an insider attack?
An insider attack is an attack that is initiated from within the network, usually by someone who has access and has an understanding of the network.
If the attacks for Lab 9 were coming from an internal IP, would you allow the attack to continue to investigate further or stop the attack?
I would permit the attack to continue so I can trace route back to the point of origin. Additionally, I would save all data that they are trying to steal to obtain proof of malicious acts.
With the information provided in lab 9, if the source of the attack is external, what steps would you take to prevent reoccurrence?
Restrict the number of login attempts that the user can perform
Block the offenders IP address after multiple failed login attempts
Monitor log files for further suspicious login attempts.
What is the best practice to deter insiders from even thinking about executing an attack?
Have all employees sign an acceptable use policy outlining what is and isn’t allowed on the network and the repercussions of violating this agreement
Regularly monitor logs for suspicious activity
Name two different types of insider attacks.
IT sabotage
Fraud and EspionageWhat services were attacked on the IIS server?
FTP
Remote Login Services
How many failed logins were detected?
17
Between what time and what time did the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    440iLabWeek7Complete

    • 152 Words
    • 2 Pages

    In this Lab I built a network that consists of various departments within an organization that utilize the internet to access the company servers. Upper management suspects that various departments within the organization are abusing the network resources by downloading music movie trailers in strict violation of company policy. I have monitored the network and the abuse of the network resources. I have taken corrective measures to track the abuse back to the appropriate department involved.…

    • 152 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The university network was a victim of a DDoS attack. Whereby a cyber criminal first acquired administrator access. We suspect that the attacker gained access to the network from an internal computer, most likely from a student PC in one of the labs. The attacker likely used keylogger software to discover administrator credentials.…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the WAN domain, enforce encryption, and VPN tunneling for remote connections. Configure routers, and network firewalls to block Ping requests to reduce chance of Denial of Service attacks. Deployment of…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ipremier Attack Essay

    • 503 Words
    • 3 Pages

    The iPremier Company CEO, Jack Samuelson, had already expressed to Bob Turley his concern that the company might eventually suffer from a “deficit in operating procedures.” Were the company’s operating procedures deficient in responding to this attack? What additional procedures might have been in place to better handle the attack?…

    • 503 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Protecting against insider security threats is one of the biggest initiatives for a business. Businesses can protect against this by incorporating stringent policies and rules for violators. They can also invest money and time into constantly monitoring employee activity. Protecting against insider security threats can be the key in making or breaking a business…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    thesis

    • 2838 Words
    • 12 Pages

    Mankind has always tried to use technologies in order to improve his life. The wheel, for instance, was invented in order to transport goods saving forces and to move more quickly. The discovery of fire helped to heat him and to defend himself from wild animals. From the very beginning man has always looked for a better way of life. Time after time, he has continued to improve his environment, both at work and at home.…

    • 2838 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Human Capital Management

    • 3306 Words
    • 11 Pages

    Silowash, G. (2013). Seven Ways Insider Threat Products Can Protect Your Organization. Retrieved from http://www.cert.org/blogs/insider-threat/post.cfm?EntryID=174.…

    • 3306 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Thesis

    • 861 Words
    • 4 Pages

    The Dwarf Cavendish banana (or simply Cavendish banana), is a banana cultivar originally from Vietnam and China. It is one of the most commonly planted banana varieties from the Cavendish group, and is the leading fruit grown in the Philippines. Its prospect in the domestic and foreign markets is promising as demands for fresh and processed products are increasing. According to the National Industry Cluster Capacity Enhancement Project of the Department of Trade and Industry, “The Philippines’ production area of banana ranked as the third largest in the world at 415,000 hectares in 2004 or about 8.5% of the total world area. It ranked second to India which has 680,000 hectares. The country’s production area from 1990 to 2004 was increasing at a rate of 2.2% per year1.” Cavendish banana also comprises 50 % of the 2.21 million metric tons of banana production in the Philippines from October to December of 2012, as declared by the Bureau of Agricultural Statistics2.…

    • 861 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Thesis

    • 76921 Words
    • 308 Pages

    ORGANIZATIONAL RESOURCES, INDUSTRY MEMBERSHIP, AND FIRM PERFORMANCE: THE ROLE OF CAPABILITY FORMATION AND USE IN VALUE CREATION FOR IPO-STAGE NEW VENTURES…

    • 76921 Words
    • 308 Pages
    Good Essays
  • Good Essays

    Thesis

    • 1300 Words
    • 6 Pages

    Monitoring is the regular observation and recording of activities taking place in a project or programmed. It is a process of routinely gathering information on all aspects of the project, supervising activities in progress to ensure they are on-course and on-schedule in meeting the objectives and performance targets. To monitor is to check on how project activities are progressing. It is observation; ─ systematic and purposeful observation.…

    • 1300 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Combating Terrorism

    • 466 Words
    • 2 Pages

    Once you know where they will attack, you can begin setting up procedures to stop them. One of the most obvious rules is to simply have security scout the area for anything unusual. At an airport, for example, security guards should be constantly patrolling the area and if they notice anything strange, they should check it out. There should be some sort of system to check bags for harmful items and of course a metal detector. Some sort of smaller system should be placed in any type of area that terrorist are known to attack, not just airports. It should not have to be as extensive as airport security, but there should at least be a scanner that checks for explosives or harmful items. One of the greatest tools that can be used to combat terrorism is to simply get citizens involved and make sure they understand how important it is to report anything that is out of place. This is especially true at airports because they have…

    • 466 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Thesis

    • 1133 Words
    • 5 Pages

    Provided that the new student or transferee passed the entrance exam, the student is required to submit his or her credentials (Form 138 (Report Card), Form 137-A (Transcript of Records), Certificate of Good Moral and Birth Certificate) to the registrar. The student is then required to fill up and submit a registration form to the registrar, the cashier and another copy for the student. The registration form is composed of the student’s personal information.…

    • 1133 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Thesis

    • 1333 Words
    • 6 Pages

    A PROPOSED AUTOMATED EXAMINATION FOR IT STUDENT FOR CIP PLF CROG FILIPINO 1 SUBJECTS OF INFORMATICS INTERNATIONAL CAINTA…

    • 1333 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    thesis

    • 2170 Words
    • 6 Pages

    The focus should be in marketing and social networks, database plays only a supporting role. [In recent years, the increased flexibility and user-friendliness of computer databases make systems a crucial business component. In fact, some universities are now using Computer Database Management System for a faster and safer manifestation of data. This system will help resolve the problem of maintaining and recovering Alumni profiles using the manual data processing. Manual processing is known for its accurate results but it is only good when the number of data to be process is less. In updating of Alumni records, it takes time in retrieving their records. For safekeeping and fast data processing, development of the System should be in hand. It’s a good thing that also technology evolve for more innovative way of making things done in a lesser time and lesser materials.] Thus the researchers propose a development of a database for Alumni’s profile for the benefit of the graduates of the school and office of the student services, this programmed database is of great help to the mechanism and can improve the function of the office to be more organized in keeping file. he advent widespread use of computers are used by organization, offices, industries and institutions for developing of their management process and systems. Using computers, and through the presence of World Wide Web, people can spend countless hours studying websites to improve their know led.he advent widespread use of computers are used by organization, offices, industries and institutions for developing of their management process and systems. Using computers, and through the presence of World Wide Web, people can spend countless hours studying websites to improve their knowledhe advent widespread use of computers are used by organization, offices, industries and institutions for developing of their management process and systems. Using computers, and through the presence of World Wide Web, people can…

    • 2170 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Thesis

    • 698 Words
    • 3 Pages

    The Responsible Parenthood and Reproductive Health Act of 2012 (Republic Act No. 10354), informally known as the Reproductive Health Law, is a law in the Philippines which guarantees universal access to methods on contraception, fertility control, sexual education, and maternal care.…

    • 698 Words
    • 3 Pages
    Good Essays