Scenario: An intern employee names James has found a USB on the ground coming into work, he wants to find the owner.

Discussion and responses_2_ETC

Subject: Emerging Threats & Countermeasures

Scenario: An intern employee names James has found a USB on the ground coming into work, he wants to find the owner. He plugs the USB drive into his workstation computer and the drive appears to be empty. He sees that the command prompt flashes open and closes. Unknowingly he just executed a worm or botnet into the network. He informs you (the CIO) that he believes that he has unleashed a worm.

Task: How would you track, and remove the worm the network?

Areas to consider:

  • What ports or port types will have unusual activity.

1) Discussion Topic (Around 500 to 600 words) need to submit before Wednesday Noon (today is Monday).

2) Respond to at least 2 other students with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:

  • What did you learn from your classmate’s posting?
  • What additional questions do you have after reading the posting?
  • What clarification do you need regarding the posting?
  • What differences or similarities do you see between your posting and other classmates’ postings?

Reference:

* Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.

* Virus versus worm:’https://youtu.be/1D2m2Tz766Q

 

* Reference PPT

NOTE:

– I need help from tutor regarding how to work on this task, since am new to this, so that i can work for futures assignments with minor tutor help for writing and for making corrections to my work

 

Answer Preview……………..

In reaction to this, it is apparent that the worm will affect numerous networks upon introduction. As such, there is likelihood that different ports may end up being at risk of infection and damage. According to this post, servers of FTP are said to carry vulnerabilities like directory traversals and authentication capacities. Clarification of how the FTP carries these vulnerabilities…………………..

APA 267 words

Share this paper
Open Whatsapp chat
1
Hello;
Can we help you?