How much more complicated would the process be for computers


Assignment: Information Security Breaches

Create a 2 to 2.5 page document in Microsoft word answering the following questions regarding antivirus and NMap scans:

• Most network breaches go undetected for weeks or even months, and an attacker usually takes steps to be much more careful than our scans were. With that in mind, write a short paragraph describing how the default Windows firewall and security settings might contribute to this inability to detect an attacker probing from inside your network.

• This was just a single system on a local LAN. How much more complicated would this process be for 100 computers? What about an enterprise with 10,000 computers on their LAN/WAN?

• Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, internet-accessible systems regularly being built and brought online. What advantages or challenges might there be protecting such systems from malware and from attack?

• Finally, conclude this week's assignment with a page explaining how the same types of tools demonstrated in this lab might be used by an infrastructure administrator to help secure an environment.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also include a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also Include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: How much more complicated would the process be for computers
Reference No:- TGS02948659

Now Priced at $35 (50% Discount)

Recommended (97%)

Rated (4.9/5)