Jasmine
Style | APA |
Number of words | 802 |
Number of sources | 0 |
Spacing | Double |
PowerPoint slides | 0 |
Question
Details: respond to the following questions in a Microsoft® Word document. List the question in the paper and follow the question with your answer.
Note: The Lab is not a requirement to complete this assignment.
Most network breaches go undetected for weeks or even months, and an attacker usually takes steps to be much more careful than our scans in the lab were. With that in mind, write a short paragraph describing how the default Windows® firewall and security settings might contribute to this inability to detect an attacker probing from inside your network.
This lab was just a single system on a local LAN. Describe the complication added to this scan process in a large enterprise network with over 1000 computers in the LAN/WAN.
Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, internet-accessible systems regularly being built and brought online. Describe the challenges in preventing attacks in this environment.
Finally, conclude this week’s assignment with a page explaining how the same types of tools demonstrated in this lab might be used by an infrastructure administrator to help secure an environment.
Organization and Formatting Cover sheet and References required.
NOTE: If you do not use references in this assignment, note that with “References: None” in t