Threats

Complete the Practice Lab titled “AntiVirus and NMAP Scans.”

 

Capture screenshots taken during the lab in a Microsoft® Word document as specified within the lab instructions.

 

At the end of the lab, you will be asked torespond to the following in a 2- to 2.5-page response at the end of your Microsoft® Word document: 

  • Most network breaches go undetected for weeks or even months, and an attacker usually takes steps to be much more careful than our scans were. With that in mind, write a short paragraph describing how the default Windows® firewall and security settings might contribute to this inability to detect an attacker probing from inside your network.
  • This was just a single system on a local LAN. How much more complicated would this process be for 100 computers? What about an enterprise with 10,000 computers on their LAN/WAN?
  • Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, internet-accessible systems regularly being built and brought online. What advantages or challenges might there be protecting such systems from malware and from attack?
  • Finally, conclude this week’s assignment with a page explaining how the same types of tools demonstrated in this lab might be used by an infrastructure administrator to help secure an environment.

 

Submit your assignment.

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *