DO NOT COPY AND PASTE FROM A WEBSITE IT HAS TO BE IN YOUR OWN WORDS. THANKS! 1-
ID: 643303 • Letter: D
Question
DO NOT COPY AND PASTE FROM A WEBSITE IT HAS TO BE IN YOUR OWN WORDS. THANKS!
1- As a corporate network administrator the industry standard suggests your job is to maintain the confidentiality, availability, and integrity of all network resources. Choose an attack that affects one (1) of the three (3) areas in question. Describe the attack, and provide one (1) example that illustrates the primary manner in which such an attack could damage a company. Suggest at least one (1) strategy that a company can use in order to protect itself against the identified attack.
2- Explain three (3) approaches to protecting an enterprise network against malware or viruses. Suggest two (2) security products that one may use in conjunction with one another to help protect network resources. Of the two (2) suggested products, give your opinion of the one (1) that provides the greatest degree of protection for the enterprise. Provide a rationale for your response.
Explanation / Answer
attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset.
Malicious threats consist of inside attacks by disgruntled or malicious employees and outside attacks by non-employees just looking to harm and disrupt an organization.
The most dangerous attackers are usually insiders (or former insiders), because they know many of the codes and security measures that are already in place. Insiders are likely to have specific goals and objectives, and have legitimate access to the system. Employees are the people most familiar with the organization's computers and applications, and they are most likely to know what actions might cause the most damage. Insiders can plant viruses, Trojan horses, or worms, and they can browse through the file system.
The insider attack can affect all components of computer security. By browsing through a system, confidential information could be revealed. Trojan horses are a threat to both the integrity and confidentiality of information in the system. Insider attacks can affect availability by overloading the system's processing or storage capacity, or by causing the system to crash.
People often refer to these individuals as "crackers" or "hackers." The definition of "hacker" has changed over the years. A hacker was once thought of as any individual who enjoyed getting the most out of the system he or she was using. A hacker would use a system extensively and study it until he or she became proficient in all its nuances. This individual was respected as a source of information for local computer users, someone referred to as a "guru" or "wizard."
Now, however, the term hacker refers to people who either break in to systems for which they have no authorization or intentionally overstep their bounds on systems for which they do not have legitimate access.
The correct term to use for someone who breaks in to systems is a cracker.Common methods for gaining access to a system include password cracking, exploiting known security weaknesses, network spoofing, and social engineering.
Malicious attackers normally will have a specific goal, objective, or motive for an attack on a system. These goals could be to disrupt services and the continuity of business operations by using denial-of-service (DoS) attack tools. They might also want to steal information or even steal hardware such as laptop computers. Hackers can sell information that can be useful to competitors
2)
Plan
As you design an approach to resist, detect, and respond to malware enterprisewide, begin by understanding the threat landscape relevant to your computing environment. This process involves reviewing what infection vectors you
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.