Week 2 Assignment - IT Infrastructure - CH

pdf

School

Saint Louis University *

*We aren’t endorsed by this school

Course

1000

Subject

Computer Science

Date

Dec 6, 2023

Type

pdf

Pages

3

Uploaded by BarristerUniverse12734

Report
Aakash Patel CIS3250 08/30/2023 LAN Domain: Spam Email What is at risk? What is affected? Spam emails are usually malicious mail that gets sent to a user’s work email trying to trick them to do something. Emails could have phishing links and fraudulent content to try and get information out of them. Phishing attacks can steal login information. Malware distribution can carry viruses where the user will no longer have access to their computer. Responding or interacting can cause data breaches. How might the threat or vulnerability lead to an attack? What countermeasures could prevent security issues? Having email filters and anti-phishing measures should help. Last place I worked had fake phishing emails or malware emails that were sent out by our cybersecurity team and the only way to regain access was to do training or take it into the cybersecurity team to “fix” the malware. User training is so important because it is so easy to get a fake email that looks so real. Having regular updates and networking monitoring is also so important to see what is going on and where it is coming from. By addressing the scope of the threat related to spam emails, organizations can enhance their cybersecurity posture within the LAN domain and
minimize the potential risks and damages associated with these types of attacks User Domain: Weak account passwords What is at risk? What is affected? Weak passwords are one of the most significant vulnerabilities in the user domain. Guessable passwords or common words like “password” or the name of the company they work for is a big threat. I work in customer service and when we asked for their password we had so many people had the same password and we had to force them to change the password. We also were also forced to use a password generator to change their password if it was risky. Having weak passwords can let anyone access all the files and security the user has on their computer. If the company you work for can’t afford or doesn’t have different elevated accounts you can also risk sharing sensitive information. How might the threat or vulnerability lead to an attack? What countermeasures could prevent security issues? Weak passwords will lead to data breaches and/or identity theft. When I worked in customer service we had to remote in sometimes and user’s would have their passport and SS information on their home screen. When we saw stuff like that we had to report it to their supervisor and send them a training link. A great countermeasure is enforcing regular password changes. User’s would get a link 7 days before their passwords expire to change it and passwords would only last a month. We also had training
and workshops that were enforced by each department. Another nice thing that can be done is that only elevated accounts can download softwares. Lastly, monitoring accounts by seeing if there have been multiple failed login attempts. After a certain time the account should get locked.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help