What ports or port types will have unusual activity

Assignment Help Basic Computer Science
Reference no: EM132380009

Scenario: An intern employee names James has found a USB on the ground coming into work, he wants to find the owner. He plugs the USB drive into his workstation computer and the drive appears to be empty. He sees that the command prompt flashes open and closes. Unknowingly he just executed a worm or botnet into the network. He informs you (the CIO) that he believes that he has unleashed a worm.

Task: How would you track, and remove the worm the network?

Areas to consider:

What ports or port types will have unusual activity.

Reference no: EM132380009

Questions Cloud

What role do you think IDS network and host-based : What role do you think IDS (network and/or host-based) should have in the security posture of a home network?
Web application vulnerabilities : Web application vulnerabilities. Write a brief report about the article, including the relevance of the article to the module, issues raised,
Composition deal with overall readability-meaning of project : Composition deals with the overall readability and meaning of the project. the topic of composition is divided into project-level and chart-level composition.
Business case for information governance programs : The business case for information governance (IG) programs has historically been difficult to justify.
What ports or port types will have unusual activity : How would you track, and remove the worm the network? What ports or port types will have unusual activity.
Discuss conditions necessary for successful innovation : Discuss conditions necessary for successful innovation. Discuss strategic opportunities to innovation with Big Data.
Topic of managerial issues of networked organization : Research at least two articles on the topic of managerial issues of a networked organization. Write a brief synthesis and summary of the two articles.
Business culture can have impact on company implementation : Describe how the business culture can have an impact on a company's implementation of a new Information Governance program.
Penetration testing in corporate environment : Imagine you are an information security manager. How would you consider utilizing penetration testing in a corporate environment?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a paper that defining computer science

Write a paper that defining Computer Science and the kinds of jobs that computer scientists do.

  Creating a work breakdown structure

In no less than one hundred words What resources might we consider when creating a work breakdown structure (WBS)? Is all about technical issues?

  Voice over protocol

Voice Over Protocol

  Designing team and team identity

Designing Team and Team Identity. Combine each summarize in one paper but do not change the wording of the original summary.

  Deploy a constellation of geosynchronous

Build the Space Network Deploy a constellation of geosynchronous relay satellites to support LEO missions that require continuous coverage.

  Give a polynomial-time algorithm to find a subset

So this is the question they pose to you: Which of the remaining applications, if any, should be moved? Give a polynomial-time algorithm to find a subset S of {2, 3,..., n} for which the sum of the benefits minus expenses of moving the application..

  What is the sales revenue for acme

What is the sales revenue for ACME? (round your answer to 2 decial places) $__Billion. What is the sales revenue for EMCA (round your answer to 2 decial places)

  What is the programming model of a hcs12 microcontroller

What is the programming model of a HCS12 microcontroller

  What is the impulse response of the bandpass filter

What is the major problem with the frequency translation method for transforming a prototype lowpass filter into a bandpass filter?

  What you find insightful and problematic in their views

Discuss similarities and differences in the views of Samuel Florman and Alasdair Maclntyre, and what you find insightful and problematic in their views.

  Find the corners of the solution region

Learning environments An experiment that involves learning in animals requires placing white mice and rabbits into separate, controlled environments.

  Determine the plaintext m from a given ciphertext

Show that it is not necessary to factor n in order to determine the plaintext m from a given ciphertext c, the public key e, and the modulus n.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd