Business > CASE STUDY > security standard_Task1.docx Security Policies and St (All)
security standard_Task1.docx Security Policies and Standards, Best Practices– VLT2 Subject: - Task 1 A1: THREATS TO SERVER 1.Denial of servi... ce: In this form of attack, a request is sent to the server beyond what it can handle, the most common is flooding the server with ping requests (ping of death) is sent to the server, which will engage the server all through the duration denying the server from responding to legitimate traffic. 2.Social engineering: For such an organization where user security awareness training may be lacking. Users especially the server admin users may fall for this social engineering attack via phishing to steal admin credential that can aid the attacker in gaining access to the server and compromise its data. 3.Operating system vulnerability: The operating system running on the server might not be patch with the current security update from the vendor. For instance, Microsoft release patches including critical security patches every Tuesday. Important security updates including zero-day fixes are released during this time. Any server that did not receive such update become vulnerable. An attacker can exploit such server to ex-filtrate important data stored in the server. 4.Malware: When a server is infected with some malware, it exhibits behavior like been extremely slow to respond. This can be in the form of a worm, virus, rootkits. Even ransomware can infect such server, lock it down and request ransom in the form of bitc. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . [Show More]
Last updated: 1 year ago
Preview 1 out of 10 pages
Instant download
Buy this document to get the full access instantly
Instant Download Access after purchase
Add to cartInstant download
Connected school, study & course
About the document
Uploaded On
Sep 04, 2022
Number of pages
10
Written in
This document has been written for:
Uploaded
Sep 04, 2022
Downloads
0
Views
33
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·