Nt1330 Unit 7

Improved Essays
1. Focus on the overall “security assessment” risk rating that appears at the top of your report. Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you? Why or why not? What measures should you plan to undertake if the green checkmark did not appear?
After seeing my result assessment I was actually surprise from my results. My personal computer (PC) actually received “severe risk” and “blank or weak password” which it actually makes sense because everyone in the house uses the computer; I decide to use because my brand new laptop will not giving the results I’m looking for. In addition, the house PC does not have a password except on my parent’s accounts so I was bound to receive a red flag for bad security practice. After doing assessment I actually suggest we all open our own accounts and create
…show more content…
Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy (Malware). Malware is able to accomplish this by its works to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user. The type of malware that could be used is a Rootkit Malware. A rootkit is a type of software designed to hide the fact that an operating system has been compromised, sometimes by replacing vital executable. Rootkits allow viruses and malware to “hide in plain sight” by disguising as necessary files that your antivirus software will overlook (What is a Rootkit Virus?). Owners are able to implement files, monitor what’s being down on the computer and change the systems on the

Related Documents

  • Decent Essays

    Nt1310 Unit 5 Lab 3

    • 441 Words
    • 2 Pages

    It is one of the key features to test penetration included in Kali. Furthermore, Kali includes Armitage, which is a Metasploit tool which allows a team to share sessions, hosts, event logs and most importantly share access to their exploited hosts. Bots, which can be written using a language called Cortana, can also be utilized to further assist in exploitation using Armitage. Armitage will also check and see which exploits are viable and effective on your targeted machine. Once the initial exploitation is completed, you will be able to perform greater degrees of exploitation such as logging keystrokes and accessing the file system.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The Win32/Sogou is a dangerous Trojan Downloader that invades the windows based PCs without getting permission from the user. This malicious application spreads through social media websites and can destroy a computer in a way that it becomes useless permanently. This tricky Trojan application is developed by the hackers to get remote access of the data and system folders in computer. Dalhousie University dataset contains both botnet and benign traces.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6

    • 858 Words
    • 4 Pages

    Task-5 a) • Metals Metal structure is made up of crystals of metals which are made up of positive metal ions and these ions are surrounded by a sea of delocalized electrons. To separate these substances from this crystal lattice a lot of energy is needed. In between the positive and negative ions is present a strong electrostatic force of attraction. That is the reason why metals have strong melting and boiling points. In order to slide one layer of the metal ions over the other layer very less amount of energy is used.…

    • 858 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 1 Lab 1

    • 439 Words
    • 2 Pages

    Speed, availability, and reliability are vital for a successful network infrastructure in terms of productivity and user experience. When first configuring this lab, I had to make the decision of whether or not to use one server to run all of the services or if the load should be distributed amongst multiple machines. I decided to go with the later, having a separate server hosting the wiki, another providing monitor services, and yet another acting as the DHCP, DNS and AD controller. While the last three were not required in the scope of this lab, I wanted to set up my initial network in a scalable manner, and this was the best solution for future growth. Distributing the services across multiple machines helps to reduce the processing that each box is required to do in order to fulfill requests.…

    • 439 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Pt1420 Unit 5 Lab Report

    • 1875 Words
    • 8 Pages

    Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service attack. It is run on web servers, with the purpose of identifying software susceptibilities in client machines, communicating with it and exploiting discovered vulnerabilities to upload and execute malicious code on the client. 3 e. How many options are there? How many of these are required?…

    • 1875 Words
    • 8 Pages
    Superior Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Nt1310 Unit 2

    • 592 Words
    • 3 Pages

    I am a registered health information technologist. I am currently working on an Epic implementation as an analyst and trainer. All answers are based on my personal experience or my previous education unless denoted by in text citation. TASK: A. EXAMINE ELEMENTS OF THE VENDOR SELECTION PROCESS BY DOING THE FOLLOWING: 1.…

    • 592 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3

    • 271 Words
    • 2 Pages

    -------------------------------------------------------------------------------- Security ( show explanationhide explanation ) This is a public or shared computer Select this option if you are connecting from a public computer. Be sure to log off and close all browser windows to end your session.…

    • 271 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1320 Unit 7

    • 1110 Words
    • 5 Pages

    1. How is the Moon dependent on the Sun? The Moon is dependent on the Sun for its different lunar phases. Although these phases may not be essential to the existence of the Moon, they would not occur without the Sun.…

    • 1110 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Win32 Zlob Research Paper

    • 326 Words
    • 2 Pages

    It gets into your system via spam mails or unauthorized programs and websites. Once it gets into your system, it starts attracting other similar type of viruses and malware and then all these viruses launch a collective attack on the system, virtually turning…

    • 326 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Stallings and Brown (2012) describes malware as “a program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating…

    • 825 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Hackers and viruses are both security threats to a business’s network as they are both capable of stealing information. The difference is that a hacker is an expert in technology who uses their knowledge to break into computers and computer networks for either profit or motivation while a virus is software written with malicious intent to cause annoyance or damage. (Baltzan, 2013) There are several different types of hackers. Two of the most common are black-hat hackers and white-hat hackers.…

    • 1291 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Scams and Fraud Policy 1. Overview With a large number of employees at Edu Corp, scams and other fraudulent activity could affect the day-to-day operations of the company. With the ongoing concern of scams and fraud, Edu Corp has established an extensive, detailed policy in order to protect our customers and employees from various scams and fraudulent activity. In 2013, millions of people were victims of scams and fraudulent activity (“CBS Cybercrine,” 2015). With a large employee base at Edu Corp, just one employee could jeopardize the security of the company by partaking in a scam or fraudulent activity.…

    • 1577 Words
    • 7 Pages
    Great Essays