Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Note: This is a public -facing windows server that VSI employee's access Question 1 Question 2 Several users were impacted during the attack on


Note: This is a public -facing windows server that VSI employee's access Question 1 Question 2 Several users Part 2: Apache Webserver Attack: Question 1 . . . Question 2 . Based on the geographic should implement 

Note: This is a public -facing windows server that VSI employee's access Question 1 Question 2 Several users were impacted during the attack on March 25th. Based on the attack signatures, what mitigations would you recommend to protect each user account? Provide global mitigations that the whole company can use and individual mitigations that are specific to each user. Part 2: Apache Webserver Attack: . VSI has insider information that JobeCorp attempted to target users by sending "Bad Logins" to lock out every user. What sort of mitigation could you use to protect against this? Question 1 . Based on the geographic should implement Provide a "plain english "description of the rule. For example: "Block all incoming HTTP traffic where the source IP comes from the city of Los Angeles." a screen shot of the geographic map that justifies why you created this rule. 0 map, recommend a firewall rule that the networking team Provide Part 2: Apache Webserver Attack: Question 1 . . . Question 2 . Based on the geographic should implement Provide a "plain english "description of the rule. 0 For example: "Block all incoming HTTP traffic where the source IP comes from the city of Los Angeles." Provide a screen shot of the geographic map that justifies why you created this rule. . . map, recommend a firewall rule that the networking team VSI has insider information that JobeCorp will launch the same webserver attack but use a different IP each time in order to avoid being stopped by the rule you just created What other rules can you create to protect VSI from attacks against your webserver ? Conceive of two more rules in "plain english ". Hint : Look for other fields that indicate the attacker 0 Guidelines for your Submission: In a word document, provide the following: Answers for all questions Screenshots where indicated

Step by Step Solution

3.47 Rating (154 Votes )

There are 3 Steps involved in it

Step: 1

Question 1 To protect each user account based on the attack signatures the following mitigations are recommended Global Mitigations 1 Implement strong ... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Accounting Information Systems

Authors: Marshall B. Romney, Paul J. Steinbart

13th edition

133428532, 978-0133428537

More Books

Students also viewed these Business Communication questions

Question

=+b) Use it to predict the value for January 2007. Section 19.4

Answered: 1 week ago