Nt1330 Unit 7

Improved Essays
1. Focus on the overall “security assessment” risk rating that appears at the top of your report. Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you? Why or why not? What measures should you plan to undertake if the green checkmark did not appear?
After seeing my result assessment I was actually surprise from my results. My personal computer (PC) actually received “severe risk” and “blank or weak password” which it actually makes sense because everyone in the house uses the computer; I decide to use because my brand new laptop will not giving the results I’m looking for. In addition, the house PC does not have a password except on my parent’s accounts so I was bound to receive a red flag for bad security practice. After doing assessment I actually suggest we all open our own accounts and create passwords on it. Not having password on this computer is actually a bad idea because anybody can have access to personal family information. I’ve decided to make my password a bit challenging with special characters so that it’s not easy to be compromised. For a personal example, this makes a lot of sense why my job have a mandatory policy of changing their computer password every 60 days that is follow by the employees. This is a rule I will try and incorporate on my PC and laptop to help provide a better security. 2. What does MBSA do to check for weak local account passwords? From my pass experience with password cracking with brute force and dictionary attack, I believe MBSA used dictionary attack to figure out how challenging my password it. This part of this assessment took a little while to run because MSBA was running a test of different words in the dictionary. b. Why is it important to have a strong password on local user accounts especially in a corporate environment? The reason why it’s important to have a strong password on a local user accounts especially in a corporate environment is because of the sensitive information that an organization may deal with. Having a weak password makes it easy for hackers to crack your password and compromise the whole corporate information and network. Having a combination of special character, numbers, and letters makes it difficult for unauthorized users to gain access to unauthorized network. c. Explain why it is important to have a password expiration policy set. It’s very important to have a password expiration policy set because it force user to keep changing their password. This makes it difficult for user to gain access to information. However, one thing do like about password expiration policy is that if a hacker by any chance happen to crack down your password the hacker will have to figure it out again depending on how frequently the user will have to change their password. 3. Malware can affect a computer in multiple ways. Having automatic updates turned off, not allowing Windows to update, and disabling the Windows firewall and setting exceptions in the Windows firewall are all tell-tale signs of this. Explain a. how malware is able to accomplish this, and b. also what type of malware could be used. Please be as specific and fact-based as possible regarding types
…show more content…
Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy (Malware). Malware is able to accomplish this by its works to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user. The type of malware that could be used is a Rootkit Malware. A rootkit is a type of software designed to hide the fact that an operating system has been compromised, sometimes by replacing vital executable. Rootkits allow viruses and malware to “hide in plain sight” by disguising as necessary files that your antivirus software will overlook (What is a Rootkit Virus?). Owners are able to implement files, monitor what’s being down on the computer and change the systems on the

Related Documents

  • Decent Essays

    Nt1310 Unit 5 Lab 3

    • 441 Words
    • 2 Pages

    It is one of the key features to test penetration included in Kali. Furthermore, Kali includes Armitage, which is a Metasploit tool which allows a team to share sessions, hosts, event logs and most importantly share access to their exploited hosts. Bots, which can be written using a language called Cortana, can also be utilized to further assist in exploitation using Armitage. Armitage will also check and see which exploits are viable and effective on your targeted machine. Once the initial exploitation is completed, you will be able to perform greater degrees of exploitation such as logging keystrokes and accessing the file system.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Nt1310 Unit 4

    • 1249 Words
    • 5 Pages

    The first part of the experiment was determining the resolution of the DAC in volts. Before a voltage was applied the noise was determined by measuring the DC offset, the reading of the DMM at an input of zero volts. This offset was removed from the recorded values in order to provide a more accurate reading of the resolution. These corrected values and their corresponding applied voltages can be found in Table 1 of the appendix. The lowest value recorded from the DMM was -9.968V and the highest value recorded was +9.968V making the range of the DMM about 19.94±0.01V. Using the equation for calculating resolution, the resolution was calculated for values of N from 10 to 18 in increments of 2 (recorded in Table 2).…

    • 1249 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The Win32/Sogou is a dangerous Trojan Downloader that invades the windows based PCs without getting permission from the user. This malicious application spreads through social media websites and can destroy a computer in a way that it becomes useless permanently. This tricky Trojan application is developed by the hackers to get remote access of the data and system folders in computer. Dalhousie University dataset contains both botnet and benign traces.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 4

    • 545 Words
    • 3 Pages

    IV. EXPERIMENTAL RESULTS We validated the effectiveness and the advantages of our proposed design by testing both hardware and software. We have divided the validation process in two steps: 1) validating the Microcontroller based dispensing unit and 2) Tracking patient’s adherence to the prescribed medication from the server in two ways a) tracking by central nursing stuff when used within hospital b) tracking by patient’s care taker when used within house.…

    • 545 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 8

    • 375 Words
    • 2 Pages

    To explain this, we should already know that in real life scenarios, stack increases to lower memory addresses, whenever program calls some function, the address of function call instruction is saved in stack as a return for the function. When the function executes, it allocates local variables, including buffers to stack and they are given a lower address than the return address. So, in this scenario the return address is a certain level above the base address for buffers and if the buffer is overflowing, then it is most likely that an attacker can change return address as well. If the return address is changed to some random value, then it will cause segmentation fault, but if the return address is changed to a certain address where some executable code is present, then that may complete attackers intended tasks with the application.…

    • 375 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Lab 1

    • 439 Words
    • 2 Pages

    Speed, availability, and reliability are vital for a successful network infrastructure in terms of productivity and user experience. When first configuring this lab, I had to make the decision of whether or not to use one server to run all of the services or if the load should be distributed amongst multiple machines. I decided to go with the later, having a separate server hosting the wiki, another providing monitor services, and yet another acting as the DHCP, DNS and AD controller. While the last three were not required in the scope of this lab, I wanted to set up my initial network in a scalable manner, and this was the best solution for future growth. Distributing the services across multiple machines helps to reduce the processing that each box is required to do in order to fulfill requests.…

    • 439 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 7

    • 507 Words
    • 3 Pages

    Famanga Ngobeh Prof. Saunders Review Question Lab September 23, 2015 1. Move copies data from one memory location or register to another. The term “move” is a misnomer because data values in the source location aren’t removed. They’re tested, and copies of these values are placed in the destination location. Therefore, a move operator is really a copy operator.…

    • 507 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 5

    • 408 Words
    • 2 Pages

    Hi Jun, Thank you for your patience as we’ve reviewed the latest FreeFlyer files you sent us. The particular engineer who was reviewing your questions is out of the office sick today, so it will be another day or two before our full analysis can be sent back to you. However, he conveyed the preliminary results to us yesterday which I will share with you now:The primary engineer who’s reviewing your questions is out of the office sick today, so it will be another day or two before our full analysis can be sent back to you. However, they conveyed the preliminary results of their analysis to us yesterday; which I have bulleted below: • The primary reason you are seeing the discrepancies is simply due to lack of tuning in the Kalman filter. In the current configuration, much of the tracking data is being rejected, initially, during the Mission Plans set up.…

    • 408 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 2

    • 592 Words
    • 3 Pages

    I am a registered health information technologist. I am currently working on an Epic implementation as an analyst and trainer. All answers are based on my personal experience or my previous education unless denoted by in text citation. TASK: A. EXAMINE ELEMENTS OF THE VENDOR SELECTION PROCESS BY DOING THE FOLLOWING: 1.…

    • 592 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 2

    • 280 Words
    • 2 Pages

    1. What does the floor look like? Some food craps and foot prints are on the whitish-brown flooring. 2. What’s on the menu?…

    • 280 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3

    • 271 Words
    • 2 Pages

    -------------------------------------------------------------------------------- Security ( show explanationhide explanation ) This is a public or shared computer Select this option if you are connecting from a public computer. Be sure to log off and close all browser windows to end your session.…

    • 271 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Stallings and Brown (2012) describes malware as “a program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating…

    • 825 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Win32 Zlob Research Paper

    • 326 Words
    • 2 Pages

    It gets into your system via spam mails or unauthorized programs and websites. Once it gets into your system, it starts attracting other similar type of viruses and malware and then all these viruses launch a collective attack on the system, virtually turning…

    • 326 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Hackers and viruses are both security threats to a business’s network as they are both capable of stealing information. The difference is that a hacker is an expert in technology who uses their knowledge to break into computers and computer networks for either profit or motivation while a virus is software written with malicious intent to cause annoyance or damage. (Baltzan, 2013) There are several different types of hackers. Two of the most common are black-hat hackers and white-hat hackers.…

    • 1291 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Scams and Fraud Policy 1. Overview With a large number of employees at Edu Corp, scams and other fraudulent activity could affect the day-to-day operations of the company. With the ongoing concern of scams and fraud, Edu Corp has established an extensive, detailed policy in order to protect our customers and employees from various scams and fraudulent activity. In 2013, millions of people were victims of scams and fraudulent activity (“CBS Cybercrine,” 2015). With a large employee base at Edu Corp, just one employee could jeopardize the security of the company by partaking in a scam or fraudulent activity.…

    • 1577 Words
    • 7 Pages
    Great Essays