Research an attack of your choice against the windows

Assignment Help Operating System
Reference no: EM133394096 , Length: 3 Pages

Assignment:

This assignment will research an attack of your choice against the Windows, Active Directory, or Linux operating systems.

1. First, describe the attack in detail (e.g., lateral movement, credential dumping, ransomware encryption, etc.).

2. Next, describe the logs that are created when this attack is successfully run. Make sure you answer all of the following questions.

  • Are the logs unique, or would they blend in with similar events?
  • How would you use this information to search for the specific attack in a SIEM?
  • Are there any security tools that would make detecting these types of attacks easier?

Make sure you pick an attack that generates sufficient logging on your chosen operating system. For example, you may use the Japan Computer Emergency Response Team Coordination Center report on Detecting Lateral Movement through Tracking Event Logs or this presentation by a Kaspersky senior SOC analyst on Hunting for Credential Dumping in Windows Environments. You may also use another reference of your choosing if it provides relevant detail. Another resource you may find helpful is the Active Directory Security website.

This assignment should be 2 to 3 pages in length when using APA formatting standards.

Reference no: EM133394096

Questions Cloud

What it means for an intervention to be sustainable : What it means for an intervention to be sustainable? What are two methods used to promote sustainability of evidence-based interventions? What is the next
Why evidence-based research and practice is important : Discuss why evidence-based research and practice is critically important in the healthcare arena (please provide a thorough, comprehensive answer in paragraph
What type of elasticity can tell you whether ads : What type of elasticity can tell you whether ads in newspapers and ads on news websites are complements or substitutes? Calculate the elasticity you chose
Relationship of owning a home and personal : Suggest economic research topic regarding the relationship of owning a home and personal/ household income (how personal/ household income affects owning a home
Research an attack of your choice against the windows : This assignment will research an attack of your choice against the Windows, Active Directory, or Linux operating systems.
Explain how an action taken by a government to keep : Explain how an action taken by a government to keep the prices charged for child care artificially low might have the opposite effect in some cases
Discussing the economic state of the united states : Research and write 20 pages discussing the economic state of the United States from the year 2003 -2023. what has changed? what is better? What is worse
What are the economic conditions in the united states : What are the economic conditions in the United States? Like what's going on that's causing inflationary pressure? What are the main drivers (causing)
Identify concept regarding breastfeeding and skin to skin : Identify one concept regarding breastfeeding and Skin to Skin Contact that is poorly misunderstood - how would you explain this (in laymen's terms) to a new

Reviews

Write a Review

Operating System Questions & Answers

  What is the maximum size of the logical address

What is the page size in this system -  what is the maximum number of pages that can exist for a process and what is the maximum size of the logical address?

  Question 1 discuss the factors that you think would limit

question 1. discuss the factors that you think would limit how many processes a computer can effectively

  Explain scanner and the scanning process

COM 414 -COMPILER CONSTRUCTION- Explain scanner and the scanning process.Discuss storage allocating techniques and storage requirements.

  Find journals in the field of project management after you

find journals in the field of project management after you have found them examine them to determine1. what type of

  Gain e-perience with process communication

Submit a write-up as well as your program. Your write-up should include any known bugs, limitations, and assumptions in your program. This write-up should be in text-format and titled as ‘README'.

  Compile the code and run it

OptionPane.showMessageDialog(null, "How good is your memory?

  Describing the different types of operating systems

Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use out laptop or desktop computer. We use them when we use our phone.

  Unix system calls and library functions

CS4760 Operating Systems, Unix System Calls and Library Functions, The goal of this homework is to become familiar with the environment in hoare while practising system calls.

  Develop a replicator that distributes a large job

Develop a replicator that distributes a large job over a number of computers (a server group) on a single switched LAN (our Linux lab

  How does linux make file sharing safe and reliable

Analyze the use of file sharing on a local network and how sharing files increases the ease of administration through centralized file storage and file replication across servers. How does Linux make file sharing safe and reliable

  What are the advantages and disadvantages of bpm

What are the advantages and disadvantages of BPM? How do "value chain" principles apply to BPR and BPM? Why should an IT manager know the differences between the concepts?

  Write an essay on the using virtualization topic

Technicians often have to work with multiple operating systems, but are sometimes limited to a single workstation. Write an essay on the Using Virtualization topic

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd