Theoretical implications of improper configuration

Assignment Help Computer Engineering
Reference no: EM131265889

Lab Assignment: Microsoft Baseline Security Analyzer

Introduction

The Microsoft Baseline Security Analyzer (MBSA) is a powerful tool to identify missing security updates and common security misconfigurations in a networked environment. This lab will involve researching to understand the theoretical implications of improper configuration, as well as the practical aspect of using MBSA to identify configuration issues and perform remediation.

Questions

1. Focus on the overall "security assessment" risk rating that appears at the top of your report.  Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you? Why or why not? What measures should you plan to undertake if the green checkmark did not appear?

2. a. What does MBSA do to check for weak local account passwords?

b. Why is it important to have a strong password on local user accounts especially in a corporate environment?

c. Explain why it is important to have a password expiration policy set.

3. Malware can affect a computer in multiple ways. Having automatic updates turned off, not allowing Windows to update, and disabling the Windows firewall and setting exceptions in the Windows firewall are all tell-tale signs of this. Explain

a. how malware is able to accomplish this, and 

b. also what type of malware could be used. 

Please be as specific and fact-based as possible regarding types of malware using credible references to support your answers.

4. On local machines (home) computers, it is traditionally acceptable to have Windows automatically update the system with patches.  In a corporate environment, typically system administrators will set domain computers to manually install updates.  Through this process, the administrators will decide if a patch is necessary for their environment's standard operation expectancy (SOE).  Typically they would use Windows Server Update Services (WSUS) to push out the updates to the computers, which is a highly time consuming process.

Conficker is one of the most recent examples of an infection that leveraged a vulnerability that could have been avoided through a patch had already been released. Yet, it spread like wildfire, infecting millions of corporate environments.

Explain what Conficker is, which systems were vulnerable, which vulnerability it exploited, which Microsoft patch fixed the vulnerability, and the reason(s) that it is necessary to test new patches as they are released.  Please be as specific and fact-based as possible regarding types of malware using credible references to support your answer.

How would MBSA be used to detect the missing patch in a corporate environment?

5. If you were preparing the next version of MBSA, what new feature would you add? Why?

Attachment:- Lab Assignment.rar

Reference no: EM131265889

Questions Cloud

Find the emf and armature current : In a 110 V compound generator, the resistance of the armature, shunt and series windings are 0.06, 25 and 0.05 W respectively,
Revenue rulings are accumulated in the cumulative bulletins : Revenue Rulings are accumulated in the Cumulative Bulletins. One of the objectives of the federal tax law is to achieve equity across taxpayers. Under the accrual method of accounting for taxes, income is recognized in the year it is actually receive..
Identify any variable that may impact court decision proceed : For a court to consider a case it must have jurisdiction, have a recognized statutory period, and be truly adversarial for which no previous decision has been given. Create and present a case in which these components are present and identify any ..
Employees to learn new technologies : IBM Offers Training and pay cuts to its employees to learn new Technologies. Is this program strategic? Why or Why Not? Should the employees salaries be reduced for the time they attend training programs? Provide a rationale for your answer. What ..
Theoretical implications of improper configuration : The Microsoft Baseline Security Analyzer (MBSA) is a powerful tool to identify missing security updates and common security misconfigurations in a networked environment. This lab will involve researching to understand the theoretical implications ..
Taxable income for federal income tax withholding : An employee works 50 hours (50-40 were overtime hours) during a workweek in December of 2015. He earns $9,500/month, with his employer paying 1.5 times the regular rate of pay for overtime hours. To date, he has earned $109,700 during the year. He ha..
Find the speed at no-load and the speed regulation : A 600 V dc motor drives a 60 kW load at 900 rpm. The shunt field resistance is 100 W and the armature resistance is 0.16 Ω. If the motor efficiency is 85%
Montgomery record note payable and corresponding cost : On January 1, 2016, the Montgomery Company agreed to purchase a building by making six payments. The first three are to be $28,000 each, and will be paid on December 31, 2016, 2017, and 2018. At what amount should Montgomery record the note payable a..
Functionalism-conflict theory-symbolic interactionism : Which of the three sociological perspectives (Functionalism, Conflict Theory, or Symbolic Interactionism) best explains the social problems that exist in society? Why do you think the perspective that you chose best explains social problems?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Digital image processing refers to the processing

Digital image processing refers to the processing

  Include a cover page containing the title of the

you have been tasked with building a payroll program for a large organization with offices spread across the united

  How will astronomy archives survive the data tsunami

Case Study: How Will Astronomy Archives Survive the Data Tsunami? Astronomers collect and generate petabytes of data

  Explailning the forensic investigative approach

We require to assure this applicant know how to find the facts of incident and develop an initial forensic investigative approach.

  Explain how the user interface is consistent with

explain how the user interface is consistent with guidelines for designing user interfaces and for designing a

  Write a c function named change that has a floating point

Call the function change from main function three times and print out the contents of the variables quarters, dimes, nickels, and pennies after each function return.

  Describe the type and basic uses of the system how the

write a 700 to 1050 word paper identifying and describing how specific system used in an organization has transformed

  What is the goal of the implementation phase of the sdlc

Describe generalization/specializatDescribe generalization/specialization class relationship and how this relationship relates to the concept of inheritance. Explain what is the goal of the Implementation phase of the SDLC.

  Suppose password, email, name and address, max score

the password should not be same as employee ID and must contain 4-6 characters

  What occurs in an infinite loop

What occurs in an infinite loop? Create your own Repeat-until repetition arrangement.

  Implementing the stack using dynamically allocated array

Write down the C++ class which implements the stack utilizing the dynamically allocated array. The initial size of the particular stack must be evaluated when it is generated.

  What is the average number of machine cycles per instruction

What is the average number of machine cycles per instruction for this microprocessor? What is the clock rate (machine cycles per second) required for this microprocessor to be a "1 MIPS" processor?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd