This assessment is a lab that you must complete and a report for your organization's CISO. Be sure you read the instructions for the entire assessment carefully to make sure you address all requirements fully.
Complete the Identifying and Removing Malware on a Windows System lab. As you go through the lab, be sure to:
Perform all screen captures as the lab instructs and paste them into a Word document.
In the
same
Word document:
Explain the concepts and procedures associated with malware by addressing the following:
o
Explain how to determine if a computer has been compromised.
What are some of the characteristics you would expect to find?
o
Explain what happens to malware when antivirus software is run.
o
Compare a complete scan with Resident Shield.
Now apply what you learned in the lab to the following scenario.
Scenario and Your Role
DoS attacks are a threat to system security. These attacks consume system resources, network resources, and exploit programming flaws to stop legitimate system use. DDoS attacks use multiple computers to increase the intensity of the attack. For example, an attacker may use a botnet consisting
of many compromised computers to launch an attack against a corporate e-
commerce site, costing the company revenue.
Imagine that a recent cyberattack has left your web servers unresponsive, essentially closing your online store for business. The company is losing revenue every minute the site is down, and you need to stop the bleeding quickly. An analysis of the attack revealed a high consumption of system resources, high network utilization, and exploitation of programming defects.
The chief information security officer of your organization has asked you to prepare a report on how the attack may have been implemented.