Description

Instructions

This assessment is a lab that you must complete and a report for your organization’s CISO. Be sure you read the instructions for the entire assessment carefully to make sure you address all requirements fully. (COMPLETED)

Complete the Identifying and Removing Malware on a Windows System lab. As you go through the lab, be sure to:

Perform all screen captures as the lab instructs and paste them into a Word document.

In the same Word document: (COMPLETED)

Explain the concepts and procedures associated with malware by addressing the following:

Explain how to determine if a computer has been compromised.

What are some of the characteristics you would expect to find?

Explain what happens to malware when antivirus software is run.

Compare a complete scan with Resident Shield.

Now apply what you learned in the lab to the following scenario.

Scenario and Your Role

DoS attacks are a threat to system security. These attacks consume system resources, network resources, and exploit programming flaws to stop legitimate system use. DDoS attacks use multiple computers to increase the intensity of the attack. For example, an attacker may use a botnet consisting of many compromised computers to launch an attack against a corporate e-commerce site, costing the company revenue.

Imagine that a recent cyber-attack has left your web servers unresponsive; essentially closing your online store for business. The company is losing revenue every minute the site is down, and you need to stop the bleeding quickly. An analysis of the attack revealed a high consumption of system resources, high network utilization, and exploitation of programming defects.

The chief information security officer of your organization has asked you to prepare a report on how the attack may have been implemented.

Requirements

Continue working in the same document; simply start your report on a new page with an appropriate heading.

Prepare a report in which you:

Define both DoS and DDoS attacks.

Do not just copy a definition from a source; explain what they mean in your own words.

Analyze the differences between DoS attacks and DDoS attacks.

Describe the relationship between DDoS attacks and malware.

Explain how ethical hackers use DoS or DDoS to assess the damage caused by malicious hackers.

You need to support your work on this assessment with references to at least three recent, professional resources.


    Make your order right away

    Confidentiality and privacy guaranteed

    satisfaction guaranteed