Note: This is a public -facing windows server that VSI employee's access Question 1 Question 2...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Note: This is a public -facing windows server that VSI employee's access Question 1 Question 2 Several users were impacted during the attack on March 25th. Based on the attack signatures, what mitigations would you recommend to protect each user account? Provide global mitigations that the whole company can use and individual mitigations that are specific to each user. Part 2: Apache Webserver Attack: . VSI has insider information that JobeCorp attempted to target users by sending "Bad Logins" to lock out every user. What sort of mitigation could you use to protect against this? Question 1 . Based on the geographic should implement Provide a "plain english "description of the rule. For example: "Block all incoming HTTP traffic where the source IP comes from the city of Los Angeles." a screen shot of the geographic map that justifies why you created this rule. 0 map, recommend a firewall rule that the networking team Provide Part 2: Apache Webserver Attack: Question 1 . . . Question 2 . Based on the geographic should implement Provide a "plain english "description of the rule. 0 For example: "Block all incoming HTTP traffic where the source IP comes from the city of Los Angeles." Provide a screen shot of the geographic map that justifies why you created this rule. . . map, recommend a firewall rule that the networking team VSI has insider information that JobeCorp will launch the same webserver attack but use a different IP each time in order to avoid being stopped by the rule you just created What other rules can you create to protect VSI from attacks against your webserver ? Conceive of two more rules in "plain english ". Hint : Look for other fields that indicate the attacker 0 Guidelines for your Submission: In a word document, provide the following: Answers for all questions Screenshots where indicated Note: This is a public -facing windows server that VSI employee's access Question 1 Question 2 Several users were impacted during the attack on March 25th. Based on the attack signatures, what mitigations would you recommend to protect each user account? Provide global mitigations that the whole company can use and individual mitigations that are specific to each user. Part 2: Apache Webserver Attack: . VSI has insider information that JobeCorp attempted to target users by sending "Bad Logins" to lock out every user. What sort of mitigation could you use to protect against this? Question 1 . Based on the geographic should implement Provide a "plain english "description of the rule. For example: "Block all incoming HTTP traffic where the source IP comes from the city of Los Angeles." a screen shot of the geographic map that justifies why you created this rule. 0 map, recommend a firewall rule that the networking team Provide Part 2: Apache Webserver Attack: Question 1 . . . Question 2 . Based on the geographic should implement Provide a "plain english "description of the rule. 0 For example: "Block all incoming HTTP traffic where the source IP comes from the city of Los Angeles." Provide a screen shot of the geographic map that justifies why you created this rule. . . map, recommend a firewall rule that the networking team VSI has insider information that JobeCorp will launch the same webserver attack but use a different IP each time in order to avoid being stopped by the rule you just created What other rules can you create to protect VSI from attacks against your webserver ? Conceive of two more rules in "plain english ". Hint : Look for other fields that indicate the attacker 0 Guidelines for your Submission: In a word document, provide the following: Answers for all questions Screenshots where indicated
Expert Answer:
Answer rating: 100% (QA)
Question 1 To protect each user account based on the attack signatures the following mitigations are recommended Global Mitigations 1 Implement strong ... View the full answer
Related Book For
Accounting Information Systems
ISBN: 978-0133428537
13th edition
Authors: Marshall B. Romney, Paul J. Steinbart
Posted Date:
Students also viewed these business communication questions
-
What operational changes would you recommend to Wally to improve performance? Wally Meyer deftly balanced his office keys and a large printout of forecasting data as he wheeled his mountain bike...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Verify that A and AÌ = p -1 AP have the same spectrum. 19 4 2 12 1 P.
-
Describe the contingency leadership theory variables.
-
Presented below is information related to Ivan Calderon Corp. for the year 2014. Instructions (a) Prepare a multiple-step income statement for 2014. Assume that 60,000 shares of common stock are...
-
What is corporate governance?
-
Legacy issues $ 325,000 of 5%, four- year bonds dated January 1, 2013, that pay interest semiannually on June 30 and December 31. They are issued at $ 292,181 and their market rate is 8% at the issue...
-
With the evolution of operating systems in mind, I think it would be interesting to hear of your own experiences with operating systems. Share your experiences with us by engaging in a conversation...
-
The evening manager of a restaurant was very concerned about the length of time some customers were waiting in line to be seated. She also had some concern about the seating times that is, the length...
-
Initial Reactions and Feelings Dead Man Walking is a very powerful film. What feelings and/or reactions did you have while viewing it? What scenes and images in the film stand out for you? What...
-
Gravitational Fields Use the gravitational field equations to solve the problems below. 1. A 485 kg sphere sits at 14.0 km due North of a 852 kg sphere. What is the force of gravity on the first...
-
A block of mass M = 2.3 kg is suspended at rest by two strings attached to walls, as shown in the figure. The left string is horizontal with tension force T2 and and the right string with tension...
-
Discuss the pros and cons of using measures of leverage to assess whether a company faces financial distress?
-
Write in your own words about the Pros and Cons of maintaining Quality in Healthcare? Explain
-
ABC Mining has discovered a new gold deposit in the California mountains and must now decide whether to mine the deposit. The most cost-effective way to do so is to use a method sulphuric acid...
-
The movie Crip Camp: A Disability Revolution (Links to an external site.) is a documentary that begins at Camp Jened in 1971, a camp in the Catskills for adolescents with disabilities. The film then...
-
How do the principles of (a) Physical controls and (b) Documentation controls apply to cash disbursements?
-
For each of the three basic options for replacing IT infrastructure (cold sites, hot sites, and real-time mirroring) give an example of an organization that could use that approach as part of its...
-
a. Create a spreadsheet that contains the following data: b. Create a two-dimensional columnar chart that displays the data values for each variable for the five years 20102014. c. Create a new chart...
-
Wright Companys information system was developed in stages over the past five years. During the design process, department heads specified the information and reports they needed. By the time...
-
Explain from a technical viewpoint why it is important to distinguish a method, research, approach, and design. Next, briefly discuss how understanding each term individually in addition to how these...
-
Discuss the importance of validity and research design. Next, choose one type of validity (internal, external, construct, or statistical conclusion) and discuss its relevance to experimental, quasi...
-
Define a sampling strategy.
Study smarter with the SolutionInn App