Theoretical implications of improper configuration

Assignment Help Computer Engineering
Reference no: EM131265889

Lab Assignment: Microsoft Baseline Security Analyzer

Introduction

The Microsoft Baseline Security Analyzer (MBSA) is a powerful tool to identify missing security updates and common security misconfigurations in a networked environment. This lab will involve researching to understand the theoretical implications of improper configuration, as well as the practical aspect of using MBSA to identify configuration issues and perform remediation.

Questions

1. Focus on the overall "security assessment" risk rating that appears at the top of your report.  Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you? Why or why not? What measures should you plan to undertake if the green checkmark did not appear?

2. a. What does MBSA do to check for weak local account passwords?

b. Why is it important to have a strong password on local user accounts especially in a corporate environment?

c. Explain why it is important to have a password expiration policy set.

3. Malware can affect a computer in multiple ways. Having automatic updates turned off, not allowing Windows to update, and disabling the Windows firewall and setting exceptions in the Windows firewall are all tell-tale signs of this. Explain

a. how malware is able to accomplish this, and 

b. also what type of malware could be used. 

Please be as specific and fact-based as possible regarding types of malware using credible references to support your answers.

4. On local machines (home) computers, it is traditionally acceptable to have Windows automatically update the system with patches.  In a corporate environment, typically system administrators will set domain computers to manually install updates.  Through this process, the administrators will decide if a patch is necessary for their environment's standard operation expectancy (SOE).  Typically they would use Windows Server Update Services (WSUS) to push out the updates to the computers, which is a highly time consuming process.

Conficker is one of the most recent examples of an infection that leveraged a vulnerability that could have been avoided through a patch had already been released. Yet, it spread like wildfire, infecting millions of corporate environments.

Explain what Conficker is, which systems were vulnerable, which vulnerability it exploited, which Microsoft patch fixed the vulnerability, and the reason(s) that it is necessary to test new patches as they are released.  Please be as specific and fact-based as possible regarding types of malware using credible references to support your answer.

How would MBSA be used to detect the missing patch in a corporate environment?

5. If you were preparing the next version of MBSA, what new feature would you add? Why?

Attachment:- Lab Assignment.rar

Reference no: EM131265889

Questions Cloud

Find the emf and armature current : In a 110 V compound generator, the resistance of the armature, shunt and series windings are 0.06, 25 and 0.05 W respectively,
Revenue rulings are accumulated in the cumulative bulletins : Revenue Rulings are accumulated in the Cumulative Bulletins. One of the objectives of the federal tax law is to achieve equity across taxpayers. Under the accrual method of accounting for taxes, income is recognized in the year it is actually receive..
Identify any variable that may impact court decision proceed : For a court to consider a case it must have jurisdiction, have a recognized statutory period, and be truly adversarial for which no previous decision has been given. Create and present a case in which these components are present and identify any ..
Employees to learn new technologies : IBM Offers Training and pay cuts to its employees to learn new Technologies. Is this program strategic? Why or Why Not? Should the employees salaries be reduced for the time they attend training programs? Provide a rationale for your answer. What ..
Theoretical implications of improper configuration : The Microsoft Baseline Security Analyzer (MBSA) is a powerful tool to identify missing security updates and common security misconfigurations in a networked environment. This lab will involve researching to understand the theoretical implications ..
Taxable income for federal income tax withholding : An employee works 50 hours (50-40 were overtime hours) during a workweek in December of 2015. He earns $9,500/month, with his employer paying 1.5 times the regular rate of pay for overtime hours. To date, he has earned $109,700 during the year. He ha..
Find the speed at no-load and the speed regulation : A 600 V dc motor drives a 60 kW load at 900 rpm. The shunt field resistance is 100 W and the armature resistance is 0.16 Ω. If the motor efficiency is 85%
Montgomery record note payable and corresponding cost : On January 1, 2016, the Montgomery Company agreed to purchase a building by making six payments. The first three are to be $28,000 each, and will be paid on December 31, 2016, 2017, and 2018. At what amount should Montgomery record the note payable a..
Functionalism-conflict theory-symbolic interactionism : Which of the three sociological perspectives (Functionalism, Conflict Theory, or Symbolic Interactionism) best explains the social problems that exist in society? Why do you think the perspective that you chose best explains social problems?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Trying to work out where to go on vacation

If you have more than 4 days, you check your budget. If your budget is greater than $1200, you will go to Aruba. Otherwise, if it's greater than $800, you would go to Miami. If it's not greater than $800, you will go to Orlando.

  Questionyour company will be implementing a hybrid cloud

questionyour company will be implementing a hybrid cloud solution for processing and storage of personnel records.a.

  Consider whether there should be a hard

normally , we use normalization techniques a database. using the bowen et al. (2004) article, discuss the disadvantages of normalizing the database to a high degree of normalization.

  Program to find grade of students on basis of test scores

Write down a C++ program which finds a better grade for a student based upon two test scores. For a numeric average x.

  Questioninformation representationa security camera in an

questioninformation representationa security camera in an office building has 1000 x 1000 pixels. each pixel shows a

  Identity theft contribution to terrorism

Pharming, Phishing and Various types of Identity theft contribution to Terrorism in 21st Century.  Provide supporting facts in the form of "charts/graphs" (3 to 4 graphs, no more than 2 pages) and should provide citations for the source work.

  Write an application that simulates a not-so-busy airport

Write an application that simulates a not-so-busy airport, where different kinds of aircrafts, such as helicopters (military and civilian) ,airplanes ( passenger and military), can take off and land.

  Questiongenerate and display all 52 cards in a standard

questiongenerate and display all 52 cards in a standard deck of playing cards 2-10 j k q a of hearts diamonds clubs and

  Arrays and control structures important tools in programming

Arrays and control structures important tools in programming.

  Questiona i describe the meaning of storage density ii

questiona i describe the meaning of storage density. ii which type of storage system would you recommend for storage

  Brightidea is in the file storage business they give file

brightidea is in the file storage business. they provide file storage to free and paid clients all over the world. at

  Describe the four different types of joins

Describe the four different types of "joins" and provide examples of how you would use each.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd