Business > CASE STUDY > security standard_Task1.docx Security Policies and St (All)

security standard_Task1.docx Security Policies and St

Document Content and Description Below

security standard_Task1.docx Security Policies and Standards, Best Practices– VLT2 Subject: - Task 1 A1: THREATS TO SERVER 1.Denial of servi... ce: In this form of attack, a request is sent to the server beyond what it can handle, the most common is flooding the server with ping requests (ping of death) is sent to the server, which will engage the server all through the duration denying the server from responding to legitimate traffic. 2.Social engineering: For such an organization where user security awareness training may be lacking. Users especially the server admin users may fall for this social engineering attack via phishing to steal admin credential that can aid the attacker in gaining access to the server and compromise its data. 3.Operating system vulnerability: The operating system running on the server might not be patch with the current security update from the vendor. For instance, Microsoft release patches including critical security patches every Tuesday. Important security updates including zero-day fixes are released during this time. Any server that did not receive such update become vulnerable. An attacker can exploit such server to ex-filtrate important data stored in the server. 4.Malware: When a server is infected with some malware, it exhibits behavior like been extremely slow to respond. This can be in the form of a worm, virus, rootkits. Even ransomware can infect such server, lock it down and request ransom in the form of bitc. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . [Show More]

Last updated: 1 year ago

Preview 1 out of 10 pages

Add to cart

Instant download

document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

Reviews( 0 )

$5.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
31
0

Document information


Connected school, study & course


About the document


Uploaded On

Sep 04, 2022

Number of pages

10

Written in

Seller


seller-icon
helperatsof1

Member since 3 years

48 Documents Sold


Additional information

This document has been written for:

Uploaded

Sep 04, 2022

Downloads

 0

Views

 31

Document Keyword Tags

Recommended For You

Get more on CASE STUDY »
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·