Preview

Unit 2 Assignment 2

Satisfactory Essays
Open Document
Open Document
257 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 2 Assignment 2
Unit 2 Assignment 2: Microsoft Environment Analysis

1. The five vulnerabilities that exist for this LAN based workgroup are 2755801, 2501696, 2588513 2639658, 2659883. 2. Yes, the vulnerability that involves privilege elevation is 2639658 (Vulnerability in TrueType Font Parsing), but it is not a high priority. 3. 2719662
Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Apply the Microsoft Fix it solution that blocks the attack vector for this vulnerability. Disable Sidebar in Group Policy. Disable the Sidebar in the system registry.
2737111
Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Disable WebReady document view for Exchange.
2755801
Solution: Workaround refers to a setting or configuration change that would help block known attack vectors before you apply the update. Prevent Adobe Flash Player from running. Prevent Adobe Flash Player from running on Internet Explorer 10 through Group Policy on Windows 8 and Windows Server 2012. Prevent Adobe Flash Player from running in Office 2010 on Windows 8 and Windows Server 2012. Prevent ActiveX controls from running in Office 2007 and Office 2010. Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones. Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In order to try and correct the issue of the window of vulnerability (WOV), the LAN administrator needs to get the patch from Microsoft. Upon contact Microsoft has determined that it will take up to no less than three business days for the patch that we requested to be made available to us. Once we receive the patch we would need approximately several hours to download and then test out the patch to be certain that the patch will work and that this is the correct action to take to fix the Window of Vulnerability and seal the security breach on the Server Message Block server. Upon completion of testing the IT staff would need to hold a meeting to assess the quickest and most correct course of action to take after the patch has been installed to determine how to apply the patch apply it to the server and also to client computers depending on the process the IT staff decides to take it can take anywhere from one to three business days for the completion date to be met. If the IT staff were to work around the clock for overtime in shifts and the security breach was reported on a Friday with three days for the patch to be made and a week to troubleshoot and test the patch.…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    One common vulnerability is the lack of or outdated antivirus software. We get the popup alerts and click it away, because that alert is so annoying. But what must be realized is that annoying popup is a warning alert telling the user that the local workstation or network has a weakness that needs to be addressed.…

    • 167 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 10 Assignment 1

    • 344 Words
    • 2 Pages

    * The onsite updates the responsibility of the onsite IT team, and ultimately the IT supervisor. The responsibility of the restore includes the same people plus the OK from management. All parties need to be kept updated with current…

    • 344 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 5 assignment 1

    • 423 Words
    • 3 Pages

    6. When determining if a number is within a range, the OR operator would be best to use.…

    • 423 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 1

    • 306 Words
    • 4 Pages

    In 2010, the processor model that was the first to have two billion transistors on its chip was known as the Quad-Core Itanium Tukwila.…

    • 306 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    M6 Assignment

    • 387 Words
    • 2 Pages

    1. Because it displays all elevation prompts on the secure desktop, which can receive messages only from Windows processes which prevent any active Malware to continue into the secure desktop.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1330 Unit 1 Essay

    • 601 Words
    • 3 Pages

    This attack works by enticing a victim to open a malicious web page. Once a user opens the web page it gives the attacker the ability to execute remote code on the victims computer. Since this is a browser based attack, it gives the hacker potentially more targets than relying on a plugin that may not get installed. (Symantec Corporation,…

    • 601 Words
    • 3 Pages
    Better Essays
  • Good Essays

    A security breach has been identified within a small Microsoft workgroup LAN. The workgroup consists of three primary workgroups which contain group membership lists of users within the Active Directory infrastructure that currently exists on the SMB Server that is located within the confines of the LAN structure. The security breach, which is defined as any event that results in a violation of any of the CIA (confidentiality, integrity, availability) security principles, was caused by the SMB server being accessed by an unauthorized user due to a security hole that was detected by the server software manufacturer the previous day. The security patch will not be available until possible as long as three days, but hopefully within that timeframe. In addition, the LAN administrator needs at least one week (minimum) to download, test, and install the patch.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    unit 242

    • 658 Words
    • 3 Pages

    Internet security can also be altered if needed. When loading up internet explorer, click on tools and open ‘internet options’ on the drop down menu, select security on the tabs and a box like this will appear:…

    • 658 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 4 assignment 2

    • 303 Words
    • 2 Pages

    After research and careful consideration of some of the other policies listed by other companies such as AT&T, Sprint, T-Mobile, and Verizon Wireless, Richman Investments has come up with the an acceptable use policy (AUP).…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 3

    • 288 Words
    • 1 Page

    Data classification policy is important for securing data from risks, which includes unauthorized users, modification, disclosure, access, use, and removal. This is to ensure protection on data assets from unauthorized users. Data must be maintained in a secure, accurate and reliable manner and be available for authorized use. In order to implement security measures, the data must be classified into categories like; confidential, restricted, and public. Confidential and restricted will be required some sort of access mechanism to authenticate anyone who wants to access any classified documents. In order to construct a Classification policy, one must know what type of data are available, where they are located, what type of access levels are implemented and what protection level is implemented and does it adhere to compliance regulations.…

    • 288 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    vulnerability is a weakness which allows hacker to attack on system. Nessus is a vulnerability scanner that offers many features to help assess the security of control system networks, devices, servers and workstations.…

    • 692 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Canadian Tire Case

    • 656 Words
    • 3 Pages

    There are many options the company can take to resolve this issue. The first option is to continue working on the project in the manner it is now. It will eventually get done and it will not put a strain or pressure on current users. However, because this is a reactionary form of BI Maturity, much time is spent resolving issues and has little time to focus on the future of the project.…

    • 656 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS4560 Hacking

    • 675 Words
    • 2 Pages

    There is currently not a fix or solution for the weakness/vulnerability. The best that has been presented are mere suggestions to implement. There are currently only (2) suggestions, those are, 1. Do not use MD5 algorithm, Software developers, Certification Authorities, website owners, and users should avoid using the MD5 algorithm in an capacity, it should be considered cryptographically broken and unsuitable for further use.…

    • 675 Words
    • 2 Pages
    Good Essays