SEC280 Week 7 DQ 1 & DQ 2 latest 2016 september

Question # 00408935 Posted By: katetutor Updated on: 10/19/2016 03:28 AM Due on: 10/19/2016
Subject General Questions Topic General General Questions Tutorials:
Question
Dot Image
dq 1

Mitigating Risk (graded)

Top management asks you to present a review of the security risks associated with the various servers in the computing infrastructure. Take one of the servers and address three security risks from the least (low risk or moderate risk) to the greatest (high risk) and the kind of risk presented. For instance, if a server is closer to the network perimeter, it is at a higher risk of being compromised by a hacker. This is where it all starts. How do you implement consistent security policies?


dq 2

Incident Handling (graded)

Surprisingly, many of us may be unknowing victims of botnets. Because of the rising sophistication of botnet schemes, your computer can become a zombie along with thousands of other computers that flood a victim's network and bring down servers. While the attack is going on, the botnet infects the network with spam, viruses, and malware. What are the four simple rules of stopping botnets on your personal PCs?

  • What are some of the symptoms that would make you suspicious that your computer has been attacked?
  • What part of a security incident should be logged?
Dot Image
Tutorials for this Question
  1. Tutorial # 00404279 Posted By: katetutor Posted on: 10/19/2016 03:29 AM
    Puchased By: 3
    Tutorial Preview
    The solution of SEC280 Week 7 DQ 1 & DQ 2 latest 2016 september...
    Attachments
    SEC280_Week_7_DQ_1_DQ_2_latest_2016_september.docx (127.33 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    mo...nday Rating Highly satisfactory results 01/04/2017

Great! We have found the solution of this question!

Whatsapp Lisa