What preventive measures will you take in the future

Assignment Help Computer Engineering
Reference no: EM132605524

Question: Part A - You have found that you have 10 systems in your network that are infected with malware and are members of a botnet. One of the systems is a webserver, the other 9 are desktop systems used by different individuals and departments.

Utilizing your Incident Response Plan , detail how you will deal with each system.

What preventive measures will you take in the future.

Part B - As a team determine the appropriate nmap scans to complete the following:

scan for the presence of hosts/devices on a network segment (i.e. x.x.x.x/24)

port scan for all devices on a network segment (i.e. x.x.x.x/24)

scan for device OS and software versions running on all ports on a network segment (i.e. x.x.x.x/24)

Reference no: EM132605524

Questions Cloud

What versions of adobe acrobat reader are vulnerable : Research a method that PDFs are exploited. What versions of Adobe Acrobat Reader are vulnerable to the exploit? Document the methods for prevention against.
Establish a means of monitoring employee activities : Your have been asked by the CEO of your company to establish a means of monitoring employee activities in the building and when using computer equipment.
Would client prefer to contend that is selling an asset : Under the AICPA Standards, what steps should you take to determine whether your client can claim her income as a capital gain?
Effective tools in communication of power and authority : Historically, works of art have been thought of as valuable and effective tools in the communication of power and authority.
What preventive measures will you take in the future : You have found that you have 10 systems in your network that are infected with malware and are members of a botnet. One of the systems is a webserver.
Evaluate the earnings per share of common stock : Find Earnings per share of common stock, Book value per share of common stock, Payout ratio of common stock, Return on common stock equity
Post descriptions of the tools and links to the tools : Research 2 log parsing tools. These are tools that will help you read logs more effectively. Post descriptions of the tools and links to the tools.
Define whether or not proper monitoring would have detected : Research an incident that has been identified within the last year that resulted in a breach of security. Determine whether or not proper monitoring would have.
Describe the step by step response to the intrusion : Utilizing your Incident Response Plan detail a step by step response to this intrusion from beginning to end. Who, when, what, how are all required.

Reviews

Write a Review

Computer Engineering Questions & Answers

  In a previous assignment you were tasked to develop a

in a previous assignment you were tasked to develop a web-based student registration system. this web-based system

  Create a symbolic equation for het capacity

Empirical constants do not have physical meaning but are used to make the equation fir the data. Create a symbolic equation for het capacity and solve it for T.

  Compare the in-house evaluation and external evaluation

Compare the in-house evaluation and external evaluation. Identify evaluations that only exist in either one of the evaluations.

  Write a method that will traverse a linked B-tree

Write a method that will traverse a linked B-tree, visiting all its entries in order traversal of keys (smaller keys first).

  In how many ways can this be done

In how many ways can this be done? In how many ways be done if no two women may sit next to each other?

  Find the costs of compromised data integrity breaches

In 500 words, discuss risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education, science.

  Discuss the function of input and output devices

Discuss the function of input and output devices, and analyze the working principle of voice input and output systems with their present state of technology.

  What device is commonly replaced by a sequencer instruction

What is the maximum length of a sequencer file when using the SLC 500?

  Write a case statement that given an integer selector

Write a case statement that, given an Integer selector called Name, will print your first name if Name = 1, your middle initial if Name = 2, your last name.

  What would be the equivalent condition in an exit statement

What would be the equivalent condition in an exit statement? What is the major criterion for selecting a while statement over a loop statement?

  What software development methodology would you follow

What Software Development methodology would you follow in developing the computer system for ASC?

  Explain the frame format of a typical ethernet packet

Explain how carrier sense multiple access with collision detection (CSMA/CD) works.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd