This website uses cookies to ensure you have the best experience. Learn more

Unit 2 Assignment 2: Microsoft Envirnment Analysis

542 words - 3 pages

Microsoft Environment Analysis

Windows of Vulnerability is defined as the ability to attack something that is at risk. Hackers search and pride themselves on finding vulnerabilities or creating their own within a system. A few examples of vulnerabilities that will be covered in this paper are CodeRed, Spida, Slammer, Lovesan, and Sasser.

The worm named Code Red was observed on the internet on July 13, 2001. Computers running Microsoft IIS web server were attacked with this worm. Code Red worm did not infect the largest amount of computers until July 19, 2001 with 359,000 hosts being infected. The worm would spread itself in a vulnerability known as a buffer overflow. It would do this by using a long string of the repetition of the letter “N” to overflow a buffer.
Spida worm infects via Microsoft SQL ...view middle of the document...

If one of those addresses happens to belong to a host that is running an unpatched copy of Microsoft SQL Server Resolution Service, the host becomes infected and sprays the Internet with more copies of the worm.
Lovesan worm A.K.A. MSBlast or Blaster Worm was a worm that spread to computers running Microsoft operating systems Windows XP and Windows 2000. The worm spread using a buffer overflow. This allowed the worm to spreads without the users opening attachments simply by spamming itself. The worm would display a two messages reading “I just want to say LOVE YOU SAN!!Soo much.” This message gave the worm the name Lovesan; the second message read “Billy Gates why do you make this possible ? Stop making money and fix your software!!”.
Sasser worm affects computers running Microsoft operating systems Windows XP and Windows 2000. Sasser spreads through a vulnerable network port. It is particularly easy to spread without user intervention but is also easily stopped by a properly configured firewall. The worm received the name Sasser because it would spread through a buffer overflow in the component known as LSASS(Local Security Authority Subsystem).

Wikipedia, the free encyclopedia. Code Red (computer worm) - Wikipedia, the free encyclopedia. Retrieved from

IBM X-Force: Ahead of the Threat - Resources. advise118 . Retrieved from

Wikipedia, the free encyclopedia. SQL Slammer - Wikipedia, the free encyclopedia. Retrieved from

Wikipedia, the free encyclopedia. Blaster (computer worm) - Wikipedia, the free encyclopedia. Retrieved from

Wikipedia, the free encyclopedia. Sasser (computer worm) - Wikipedia, the free encyclopedia. Retrieved from

Other Papers Like Unit 2 Assignment 2: Microsoft Envirnment Analysis

Nt2580 Unit 1 Assignment 2

554 words - 3 pages Unit 1 Assignment 2 Impact of a Data Classification Standard Internal use only is information that may or may not be confidential. But is shared within a organization and kept away from the public. With that being said it is imperative that we seek the following to be incorporated within the standards in each domain. User Domain refers to the people who have access to the organizations equipment User domains is the worst domain for security

Nt2580 Unit 4 Assignment 2

706 words - 3 pages Dallas Page July 17, 2015 Unit 4 Assignment 2 NT2580 Acceptable Use Policy Definition 1. Overview To protect the integrity, confidentiality and accessibility along with the safety of our clientele and employees it is necessary that a precise set of standards must be defined for anyone who utilizes the electronic devices to access information via the internet. Richman Investments is committed to protecting employees, partners and

It500 Unit 2 Assignment 1

1789 words - 8 pages Unit 2: Assignment 1: Global Challenges Associated with E-Commerce December 18, 2012 IT500-01N: Critical Concepts and Competencies for the IT Professional Instructor: Dr. Sheila Fournier-Bonilla Kaplan University Unit 2: Assignment 1: Global Challenges Associated with E-Commerce E-Commerce has changed the ways that companies do business, they are no longer confined to certain areas, regions, or even countries. "E-Commerce and m

Foundations in Information Technology Unit 2 Assignment

1464 words - 6 pages not need to wait until the due date/time to grade your assignment! Unit 2 Assignment Requirements: How to Take a Screenshot in Microsoft Windows 1. Follow these steps to find your monitor’s color depth. Right-click the Desktop and select Personalize from the shortcut menu. In the left pane click Display and in the next window, in the left pane, click Adjust resolution. In the Screen Resolution window, click Advanced settings, and

Unit 2 Assignment 1: Service Provider Types

667 words - 3 pages Brenda Deni NT1310: Physical Networking Unit 2 Assignment 1 3/30/2014 Service Provider Types * RBOCS: Regional Bell Operating Company Service * Regional Bell operating company (RBOC) is a term describing one of the U.S. regional telephone companies (or their successors) that were created as a result of the breakup of American Telephone and Telegraph Company (AT&T, known also as the Bell System or "Ma Bell") by a U.S. Federal

Unit 2 Assignment Ss310 - Cold War Era

792 words - 4 pages Running head: Cold War Era Unit 2: Assignment NAME SS310 – Exploring the 1960’s Prof. ……….. Cold War Era The Cold War was an important event in our history. Reason being is that it shaped political ideology, foreign policies, impacted our economy, the Presidency and created an uneasy climate among Americans. The United States had been suspicious of the Soviet Union since the 1910’s, but became allies with them when

Level 3 Business Unit 2 Assignment 1

3831 words - 16 pages material costs, it checks unit costs and quantity used. For high labour costs, it compares the hourly rates and the number of hours worked with the budgeted amounts. Once the analysis has established the major sources of variance, it looks for the reasons. Variance Table for The Craft & Pottery Shop: | BUDGET (£) | ACTUAL (£) | VARIANCE | Wages | 50,000 | 56,700 | -6,700 A | Rent | 17,000 | 17,000 | 0 | Office Expenses | 7,500

Assignment 2

1016 words - 5 pages Tutor-marked Assignment 2 Weight: This assignment is worth 20% of the final grade. Due: After completing Unit 5 of Study Guide I. We suggest that you review Units 1 through 5 of Study Guide I, then try to complete the assignment without the use of books or notes; as if it were a test. This strategy will help you to prepare for the final examination. However, once you have completed the assignment, review the course material and revise

Assignment 2

797 words - 4 pages . Write a two to three (2-3) page paper in which you include the following: 1. Project title and date of authorization 2. Project manager name and contact information 3. A summary schedule 4. Project budget summary 5. Brief description of the project’s objectives 6. Project success criteria 7. Summary of planned approach for managing the project 8. Roles and responsibilities matrix 9. Use at least four (4) quality

Assignment 2

970 words - 4 pages ASSIGNMENT 3 NAME: SHIVA KUMAR REDDY BANDI STUDENT ID: 10000120422 COURSE: CMP 552 ANALYSIS MODELING AND DESIGN HOMEWORK NO: 3 DATE: 11/09/2014 TITLE: CONTEXT AND CLASS DIAGRAMS 1. Draw a context diagram and level-0 diagram for the pharmacy at Mercy Hospital fills medical prescriptions for all Patients and distributes these medications to the nurse station responsible for the patient's care. Medical prescriptions are written by

Assignment 2 - 1332 words

1332 words - 6 pages Assignment 2 Question 1: What do they have in common? Why do you think that is? The top 30 highest paying jobs are all jobs in the medicine industry. They all require at least 5 years of higher education and when you are done, you are considered a professional. I also believe that these jobs require a lot of responsibility because sometimes you have other people’s lives under your care. And a person that goes to a hospital doesn’t want

Related Essays

Unit 2 Assignment 2

4236 words - 17 pages Unit 2 assignment 2 Legislation- Human rights act- an act of parliament of the UK- the royal assent for this act was received the 9th of November 1998 with a commencement in 2000. It is an act to give further effect to rights and freedoms guaranteed under the European convention on human rights. Rights: -Right to life -Freedom from torture and inhuman or degrading treatment -Right to liberty and security -Freedom from slavery and forced

Unit 2 Assignment Ls311

762 words - 4 pages up and eyes straight in front of you. References: Negligence, required elements. (n.d.) West's Encyclopedia of American Law, edition 2. (2008). Retrieved September 8 2015 from Unit

Unit 2 Assignment 2: Computer Basics Review

614 words - 3 pages Tiffany Ostarly NT1210 Introduction to Networking Unit 2 Assignment 2: Computer Basics Review Chapter Review 1. A,C | 2. B | 3. C,D | 4. C,D | 5. D | 6. D | 7. B | 8. B | 9. A,C,D | 10. B,D | 11. D | 12. A,C | 13. C | 14. A | 15. A,D | 16. C,D | 17. D | 18. C | 19. A | 20. D | Key Terms Computer networking – the gerund form of the term computer network. Computer

Bu1410 Unit 2 Assignment 1

2804 words - 12 pages BU1410 Management Information Systems Unit 2 Assignment 1 Instructor: Willie Cooper Jr. Chapter 2 1. What are the major functions of a business that are important for understanding the role of information systems? * Define a business and describe the business functions. * According to the book “A business is a formal organization whose aim is to produce products or provide services for a