Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Note: This is a public -facing windows server that VSI employee's access Question 1 Question 2 Several users were impacted during the attack on
Note: This is a public -facing windows server that VSI employee's access Question 1 Question 2 Several users were impacted during the attack on March 25th. Based on the attack signatures, what mitigations would you recommend to protect each user account? Provide global mitigations that the whole company can use and individual mitigations that are specific to each user. Part 2: Apache Webserver Attack: . VSI has insider information that JobeCorp attempted to target users by sending "Bad Logins" to lock out every user. What sort of mitigation could you use to protect against this? Question 1 . Based on the geographic should implement Provide a "plain english "description of the rule. For example: "Block all incoming HTTP traffic where the source IP comes from the city of Los Angeles." a screen shot of the geographic map that justifies why you created this rule. 0 map, recommend a firewall rule that the networking team Provide Part 2: Apache Webserver Attack: Question 1 . . . Question 2 . Based on the geographic should implement Provide a "plain english "description of the rule. 0 For example: "Block all incoming HTTP traffic where the source IP comes from the city of Los Angeles." Provide a screen shot of the geographic map that justifies why you created this rule. . . map, recommend a firewall rule that the networking team VSI has insider information that JobeCorp will launch the same webserver attack but use a different IP each time in order to avoid being stopped by the rule you just created What other rules can you create to protect VSI from attacks against your webserver ? Conceive of two more rules in "plain english ". Hint : Look for other fields that indicate the attacker 0 Guidelines for your Submission: In a word document, provide the following: Answers for all questions Screenshots where indicated
Step by Step Solution
★★★★★
3.47 Rating (154 Votes )
There are 3 Steps involved in it
Step: 1
Question 1 To protect each user account based on the attack signatures the following mitigations are recommended Global Mitigations 1 Implement strong ...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started