This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Computer security.

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

Question one: Computer security.

The penetration testing process carried out by the Red team revealed that the Sifers-Grayson company was vulnerable to cyber-attacks. The Red Team accessed the company environment with much easy without regular employees sensing. The doors were secured, but the team gained entry by bypassing standard authentication into the building. They also remotely accessed the Company’s servers. The type of attack illustrated is the backdoor attack. The attacks are dangerous since the attacker can steal essential data, can conduct Distributed Denial of service attacks on the other personal computers and get access to company files. Therefore, the Grayson Company should install firewalls and antiviruses.

The Red Team was able to sneak into the company premises masquerading as newly employed tech experts without anyone noticing. The Sifers-Grayson Company has weak physical security. The Company should put in place, automated access control measures in and out of the company environment.

The red team stationed USB drives that had key loggers, thereby able to monitor the user’s actions without the user’s consent. The type of threat outlined in the spyware. The attacker is in a good position of recording personalized data like passwords.  Spyware attacks can be controlled through educating the employees on how to control and handle them in case they occur. Organizations need to install anti-spyware soft wares and update computer systems regularly.

 

 

 

 

 

 

 

 

Q1 (CONNOR)

The Windows Server Backup aids the backing up of a server’s database. The Windows Server Backup is utility software for the Windows Server OSs. The server administrators are in a position to schedule and specify the nature of data to backup. According to Coulter, Directory Domain Services are created on an exceptional kind of database. The Active Directory is a domain organizer that authorizes and authenticates computers and users on windows network.  The AD DS is a Lightweight Directory Access Protocol. Besides the AD DS’ back up functions, offer a programmatic restoration interface, which does not provide support for agile backups but complete backups are necessary.

 

Q2(ZACH WHITE)

The Windows Server Backup tool is known for its ability to inhibit Active Directory from recovering. The system administrator is the only individual entitled to performing backups. The admin is also responsible for the scheduling routine process of data restoration. The Active Directory recycle bin is another essential tool that aids administrators in the recovery of deleted data objects like groups and users.

There is a well-laid procedure for retrieving the deleted Active Directory objects. The system admin will have to begin by starting the Active Directory Administrative Center; he then has to choose the domain and then locate the object to be restored by clicking on it and restoring it.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask