What is an insider attack


Assignment: Protecting Digital Evidence, Documentation, And The Chain Of Custody

1. How many failed logons were detected?

2. What was the date/time shown at the top of the IIS log file you captured at the end of Part 2 of the lab?

3. What options are available to prevent brute force authentication attacks in a Windows-based domain?

4. What is an insider attack?

5. If the attacks for this lab were coming from an internal IP, would you allow the attack to continue to investigate further or stop the attack?

6. With the information provided in this lab, what steps would you take to prevent a reoccurrence of an external attack?

7. What is a best practice to deter insiders from even thinking about executing an attack?

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also include a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also Include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: What is an insider attack
Reference No:- TGS02957432

Expected delivery within 24 Hours