Discussion and responses_2_ETC
Subject: Emerging Threats & Countermeasures
Scenario: An intern employee names James has found a USB on the ground coming into work, he wants to find the owner. He plugs the USB drive into his workstation computer and the drive appears to be empty. He sees that the command prompt flashes open and closes. Unknowingly he just executed a worm or botnet into the network. He informs you (the CIO) that he believes that he has unleashed a worm.
Task: How would you track, and remove the worm the network?
Areas to consider:
What ports or port types will have unusual activity.
1) Discussion Topic (Around 500 to 600 words) need to submit before Wednesday Noon (today is Monday).
2) Respond to at least 2 other students with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:
What did you learn from your classmate’s posting?
What additional questions do you have after reading the posting?
What clarification do you need regarding the posting?
What differences or similarities do you see between your posting and other classmates’ postings?
Reference:
* Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.
* Virus versus worm:’https://youtu.be/1D2m2Tz766Q
* Reference PPT
NOTE:
– I need help from tutor regarding how to work on this task, since am new to this, so that i can work for futures assignments with minor tutor help for writing and for making corrections to my work
https://www.youtube.com/watch?v=1D2m2Tz766Q&authuser=0
Solution Preview
Topic 1_RN
In reaction to this, it is apparent that the worm will affect numerous networks upon introduction. As such, there is likelihood that different ports may end up being at risk of infection and damage. According to this post, servers of FTP are said to carry vulnerabilities like directory
(267 words)