unit 1

profilewendyfreed

 

Over the past several years, the Chief Executive Officer (CEO) of  your company has read articles on Internet Control Message Protocol  (ICMP) attacks and the use of packet sniffers to aid in hacking into  computer networks. Though the CEO understands that this is a serious  concern, he does not know what, if anything, is being done to protect  the organization's network against such attacks.

  • Prepare a Word document outlining what you have done as the network  administrator to protect the network against such attacks, as well as  additional measures to secure the network against other security  concerns including worms, viruses, DoS attacks, spyware, and other such  network intrusions that can disrupt the day-to-day business activities.  
  • Explain the concept of a social engineering attack and the  methods you would employ to reduce your organization's exposure to it.  
  • Research and explain system logging, and describe why implementing a logging process is important.  
  • Provide an example of the different types of logs to be  investigated upon detection of an incident and which logs are essential.   
    • For example, "attempts to gain access through existing accounts,”  "failed resource access attempts,” and “unauthorized changes to users,  groups, or services.”
  • Incorporate knowledge gained from completion of your LabSim tasks by referencing applicable content.
    • Posted: a month ago
    • Due: 
    • Budget: $20
    Answers 1
    • Your Answer And Report is.
      Answer rating:5Stars out of1ratings

    Purchase the answer to view it

    blurred-text