Question one: Computer security.
The penetration testing process carried out by the Red team revealed that the Sifers-Grayson company was vulnerable to cyber-attacks. The Red Team accessed the company environment with much easy without regular employees sensing. The doors were secured, but the team gained entry by bypassing standard authentication into the building. They also remotely accessed the Company’s servers. The type of attack illustrated is the backdoor attack. The attacks are dangerous since the attacker can steal essential data, can conduct Distributed Denial of service attacks on the other personal computers and get access to company files. Therefore, the Grayson Company should install firewalls and antiviruses.
The Red Team was able to sneak into the company premises masquerading as newly employed tech experts without anyone noticing. The Sifers-Grayson Company has weak physical security. The Company should put in place, automated access control measures in and out of the company environment.
The red team stationed USB drives that had key loggers, thereby able to monitor the user’s actions without the user’s consent. The type of threat outlined in the spyware. The attacker is in a good position of recording personalized data like passwords. Spyware attacks can be controlled through educating the employees on how to control and handle them in case they occur. Organizations need to install anti-spyware soft wares and update computer systems regularly.
Q1 (CONNOR)
The Windows Server Backup aids the backing up of a server’s database. The Windows Server Backup is utility software for the Windows Server OSs. The server administrators are in a position to schedule and specify the nature of data to backup. According to Coulter, Directory Domain Services are created on an exceptional kind of database. The Active Directory is a domain organizer that authorizes and authenticates computers and users on windows network. The AD DS is a Lightweight Directory Access Protocol. Besides the AD DS’ back up functions, offer a programmatic restoration interface, which does not provide support for agile backups but complete backups are necessary.
Q2(ZACH WHITE)
The Windows Server Backup tool is known for its ability to inhibit Active Directory from recovering. The system administrator is the only individual entitled to performing backups. The admin is also responsible for the scheduling routine process of data restoration. The Active Directory recycle bin is another essential tool that aids administrators in the recovery of deleted data objects like groups and users.
There is a well-laid procedure for retrieving the deleted Active Directory objects. The system admin will have to begin by starting the Active Directory Administrative Center; he then has to choose the domain and then locate the object to be restored by clicking on it and restoring it.