Theoretical implications of improper configuration

Assignment Help Computer Engineering
Reference no: EM131265889

Lab Assignment: Microsoft Baseline Security Analyzer

Introduction

The Microsoft Baseline Security Analyzer (MBSA) is a powerful tool to identify missing security updates and common security misconfigurations in a networked environment. This lab will involve researching to understand the theoretical implications of improper configuration, as well as the practical aspect of using MBSA to identify configuration issues and perform remediation.

Questions

1. Focus on the overall "security assessment" risk rating that appears at the top of your report.  Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you? Why or why not? What measures should you plan to undertake if the green checkmark did not appear?

2. a. What does MBSA do to check for weak local account passwords?

b. Why is it important to have a strong password on local user accounts especially in a corporate environment?

c. Explain why it is important to have a password expiration policy set.

3. Malware can affect a computer in multiple ways. Having automatic updates turned off, not allowing Windows to update, and disabling the Windows firewall and setting exceptions in the Windows firewall are all tell-tale signs of this. Explain

a. how malware is able to accomplish this, and 

b. also what type of malware could be used. 

Please be as specific and fact-based as possible regarding types of malware using credible references to support your answers.

4. On local machines (home) computers, it is traditionally acceptable to have Windows automatically update the system with patches.  In a corporate environment, typically system administrators will set domain computers to manually install updates.  Through this process, the administrators will decide if a patch is necessary for their environment's standard operation expectancy (SOE).  Typically they would use Windows Server Update Services (WSUS) to push out the updates to the computers, which is a highly time consuming process.

Conficker is one of the most recent examples of an infection that leveraged a vulnerability that could have been avoided through a patch had already been released. Yet, it spread like wildfire, infecting millions of corporate environments.

Explain what Conficker is, which systems were vulnerable, which vulnerability it exploited, which Microsoft patch fixed the vulnerability, and the reason(s) that it is necessary to test new patches as they are released.  Please be as specific and fact-based as possible regarding types of malware using credible references to support your answer.

How would MBSA be used to detect the missing patch in a corporate environment?

5. If you were preparing the next version of MBSA, what new feature would you add? Why?

Attachment:- Lab Assignment.rar

Reference no: EM131265889

Questions Cloud

Find the emf and armature current : In a 110 V compound generator, the resistance of the armature, shunt and series windings are 0.06, 25 and 0.05 W respectively,
Revenue rulings are accumulated in the cumulative bulletins : Revenue Rulings are accumulated in the Cumulative Bulletins. One of the objectives of the federal tax law is to achieve equity across taxpayers. Under the accrual method of accounting for taxes, income is recognized in the year it is actually receive..
Identify any variable that may impact court decision proceed : For a court to consider a case it must have jurisdiction, have a recognized statutory period, and be truly adversarial for which no previous decision has been given. Create and present a case in which these components are present and identify any ..
Employees to learn new technologies : IBM Offers Training and pay cuts to its employees to learn new Technologies. Is this program strategic? Why or Why Not? Should the employees salaries be reduced for the time they attend training programs? Provide a rationale for your answer. What ..
Theoretical implications of improper configuration : The Microsoft Baseline Security Analyzer (MBSA) is a powerful tool to identify missing security updates and common security misconfigurations in a networked environment. This lab will involve researching to understand the theoretical implications ..
Taxable income for federal income tax withholding : An employee works 50 hours (50-40 were overtime hours) during a workweek in December of 2015. He earns $9,500/month, with his employer paying 1.5 times the regular rate of pay for overtime hours. To date, he has earned $109,700 during the year. He ha..
Find the speed at no-load and the speed regulation : A 600 V dc motor drives a 60 kW load at 900 rpm. The shunt field resistance is 100 W and the armature resistance is 0.16 Ω. If the motor efficiency is 85%
Montgomery record note payable and corresponding cost : On January 1, 2016, the Montgomery Company agreed to purchase a building by making six payments. The first three are to be $28,000 each, and will be paid on December 31, 2016, 2017, and 2018. At what amount should Montgomery record the note payable a..
Functionalism-conflict theory-symbolic interactionism : Which of the three sociological perspectives (Functionalism, Conflict Theory, or Symbolic Interactionism) best explains the social problems that exist in society? Why do you think the perspective that you chose best explains social problems?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd