Preview

Unit 2 Assignment 2 Microsoft Environment Analysis Paper

Satisfactory Essays
Open Document
Open Document
499 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 2 Assignment 2 Microsoft Environment Analysis Paper
Unit 2 Assignment 2: Microsoft Envirnment Analysis
Microsoft Environment Analysis
Abstract
Windows of Vulnerability is defined as the ability to attack something that is at risk. Hackers search and pride themselves on finding vulnerabilities or creating their own within a system. A few examples of vulnerabilities that will be covered in this paper are CodeRed, Spida, Slammer, Lovesan, and Sasser.
The worm named Code Red was observed on the internet on July 13, 2001. Computers running Microsoft IIS web server were attacked with this worm. Code Red worm did not infect the largest amount of computers until July 19, 2001 with 359,000 hosts being infected. The worm would spread itself in a vulnerability known as a buffer overflow. It would
…show more content…
Microsoft recommends the “sa” account be set upon installation but many servers are not properly secured after installation. The main purpose of the Spida worm is to export an infected server’s Sam password database.
SQL Slammer worm caused a denial of service on Internet host and slowed down general internet traffic. On January 25, 2003 it spread rapidly and infected 75,000 victims in ten minutes. The worm exploited the buffer overflow and would generate random IP addresses, send itself out to those addresses. If one of those addresses happens to belong to a host that is running an unpatched copy of Microsoft SQL Server Resolution Service, the host becomes infected and sprays the Internet with more copies of the worm.
Lovesan worm A.K.A. MSBlast or Blaster Worm was a worm that spread to computers running Microsoft operating systems Windows XP and Windows 2000. The worm spread using a buffer overflow. This allowed the worm to spreads without the users opening attachments simply by spamming itself. The worm would display a two messages reading “I just want to say LOVE YOU SAN!!Soo much.” This message gave the worm the name Lovesan; the second message read “Billy Gates why do you make this possible ? Stop making money and fix your

You May Also Find These Documents Helpful

  • Satisfactory Essays

    This is when the hacker places a back door that could be done by installing a program that can give the hacker unlimited access to the database anytime which could compromise any important data such as customer personal information or even company information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Once the attacker had the administrator access the systems he/she was able to create BOTs and push to many student PCs located in various labs. The attacker then initiate a control attack by activating the BOT 's in order to form a BotNet (a.k.a. Zombie Network) with the goal of intentionally causing online services to become unusable to students (ICECC, 2009).…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    Vulnerabilities in the computers may be due the unauthorized access of the person to corrupt the information in the system related to the database, some may also format the databases where upon usage they can easily hack the information. For example, the Blaster Worm abused a Windows 2000 feebleness to make foreswearing of association conditions.…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    To advance the security of customer's Azure resources, security center helps to prevent, detect and counter to threats.…

    • 553 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IS4680 Lab 4 Q&A

    • 1180 Words
    • 4 Pages

    The United States of America is at the top of the list when it comes to SQL Injections and SQL Slammer infections, China comes in second. Cybercriminals have made vast improvements to their infrastructure over the last few years. Its expansion is thousands of websites vulnerable to SQL Injections. Malicious code writers have exploited these vulnerabilities to distribute malware so quick that the government cannot contain such a large quantity. The infected web servers redirected unsuspecting visitors to malicious websites, then the victim’s computers were then subjected to client-side exploit code. Once infected, these computers were added to the thousands of bots under the control of hackers. The attackers knew antivirus companies would write updates and software vendors will patch their code so they made sure their malicious web sites were loaded with a variety of exploit codes.…

    • 1180 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    To calculate the Window of Vulnerability (WoV) for this security breach, the following timeline will be used as a guideline to determine the basis for calculation:…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Us Vs Arabo Case Study

    • 459 Words
    • 2 Pages

    This was causing disruption to the operations of major online retail businesses, data backup, and companies that provide communications, banks, and information services to the medical and pharmaceutical industries resulting in severe attacks of their corporate websites, internet access, data-storage, e-mail and disaster-recovery systems. The infected computers also targeted students at two college campuses in Pennsylvania and Massachusetts. Based on what I found in my research, an estimate of $504,000 in financial losses resulted from these…

    • 459 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    iss project0

    • 376 Words
    • 1 Page

    3. Do you think this attack was the result of a virus or a worm? Why do you think this?…

    • 376 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    A virus is a self-replicating program that copies itself from machine to machine, usually over a network. Viruses spread by attaching themselves to other programs. They have various effects, from displaying harmless messages to erasing hard disks. Unlike worms, viruses focus on damaging local data (Oz, 19). A virus can be embedded in a Trojan horse. A Trojan horse is a useful program, like a game, that has malicious software deliberately embedded within it. There are other poorly written software which are vulnerable to an SQL injection attack.…

    • 1128 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Computer Malware

    • 827 Words
    • 4 Pages

    Many early infectious programs, including the first Internet Worm and a number of MS-DOS viruses, were written as experiments or pranks. They were generally intended to be harmless or merely annoying, rather than to cause serious damage to computer systems. In some cases, the perpetrator did not realize how much harm their creations would do. Young programmers learning about viruses and their techniques wrote them for the sole purpose that they could or to see how far it could spread. As late as 1999, widespread viruses such as the Melissa virus appear to have been written chiefly as pranks.…

    • 827 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Once released, the person who has released a computer virus has no control on how this virus will spread. It jumps from machine to machine, using the unpredictable patterns of software sharing among the users. Clearly, it can easily reach systems on which it is not wanted or on which it would be incompatible with the environment and would cause unintentional damage. It is not possible for the virus writer to predict on which systems the virus will run and therefore it is impossible to test the virus on all those systems for compatibility. Furthermore, during its spread, a computer virus could reach even a system that had not existed when that virus has been created—and therefore it had been impossible to test the virus for compatibility with this system.…

    • 628 Words
    • 3 Pages
    Good Essays
  • Good Essays

    ollie mullin

    • 866 Words
    • 4 Pages

    It attacked via-email and sent an email with the subject of “ILOVEYOU”. When the user opened the message it would infect the computer and everyone else’s in the address book.…

    • 866 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Essay on Computer Virus

    • 599 Words
    • 3 Pages

    Worms – The Worm-style of virus is a program that, once inside your system, multiplies and scans for flaws or loop-holes in your security systems and protection. The Worm-style virus attempts to spread itself through a large network by taking advantage of the loop-holes and flaws that it finds or sending itself through the intranet of the network to other computers.…

    • 599 Words
    • 3 Pages
    Good Essays
  • Good Essays

    ■ Steal confidential data. The Bugbear-D worm records the user's keystrokes, including passwords, and gives the virus writer access to them.…

    • 563 Words
    • 3 Pages
    Good Essays
  • Good Essays

    cyber crimes

    • 546 Words
    • 3 Pages

    It is often facilitated by crimeware programs such as keystroke loggers, viruses, rootkits or Trojan horses.…

    • 546 Words
    • 3 Pages
    Good Essays