Preview

Clculate Windows of Vulneravilty

Satisfactory Essays
Open Document
Open Document
286 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Clculate Windows of Vulneravilty
What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.
Advisory Number:
2755801
2501696
2588513
2639658
2659883

2. Do any vulnerabilities involve privilege elevation? Is this considered a high priority issue?
Yes, 2639658 Vulnerability in TrueType Font Parsing Could Allow Elevation of Privilege, but not a high priority issue.

3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.
Advisory Number: 2719662
Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Apply the Microsoft Fix it solution that blocks the attack vector for this vulnerability. Disable Sidebar in Group Policy. Disable the Sidebar in the system registry.
Advisory Number: 2737111
Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Disable WebReady document view for Exchange.
Advisory Number: 2755801
Solution: Workaround refers to a setting or configuration change that would help block known attack vectors before you apply the update. Prevent Adobe Flash Player from running. Prevent Adobe Flash Player from running on Internet Explorer 10 through Group Policy on Windows 8 and Windows Server 2012. Prevent Adobe Flash Player from running in Office 2010 on Windows 8 and Windows Server 2012. Prevent ActiveX controls from running in Office 2007 and Office 2010. Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones. Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    To resolve the issue of the window of vulnerability (WoV), we would need to get the patch from Microsoft. According to Microsoft, it will take up to 3 days for the patch to be available. Then, we would need additional time to download and test the patch to make sure that this is what is needed to fix the security breach on the SMB server. After doing the testing, the IT department would need time to install the patch onto the servers and deploy to the client computers. This will take 2 days to do, depending on the IT staff, if they work on weekends will determine the completion date. Meaning, if they will work on the weekend, then the deployment to all computers and servers will be done by that Sunday. If not, then it will be the following Tuesday. So, the time that is needed would be a week.…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    M6 Assignment

    • 387 Words
    • 2 Pages

    1. Because it displays all elevation prompts on the secure desktop, which can receive messages only from Windows processes which prevent any active Malware to continue into the secure desktop.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Advanced Topologies, Inc. needs to look at its Human Resources department and how they train their new employees. Right now the threat will mostly come from Matthias because he has been working without the knowledge needed to look for security threats. Without the right training for your employees, you run the risk of being your own threat. To remove the risk that Matthias may bring to ATI, he should have been properly trained before starting. All administrators should have the information security training before working on ATI’s network. Alfonso should be aware of what security concern will affect ATI, but as the superior, he did not seem overly concerned about the security of the network. Ensuring that personnel have the right skills to administer your network is a plus for a superior. Alfonso should not have not allowed Matthias to work on the network, without first informing him of all of his responsibilities. Once the inside threat has been removed we can now move on to looking at other users. Network monitoring is just important as knowing how your network runs. With the right training, you will know what threats to be aware of.…

    • 621 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The problem comes in finding and fixing these problems. Depending on how big or small the weakness is determines how detrimental the risk is. After reviewing the infrastructure of Aircraft Solutions, I was able to determine that there were a few things that would put their system in a vulnerable state and potentially put their system at risk. The two areas where they are most vulnerable are the hardware and the policy. The first vulnerable area is the hardware of the firewalls that are not being used appropriately to protect the network against breaches in the networks architecture and hierarchy. Without the firewall in place it exposes the network (LAN) to any malicious internal as well as external attacks. These attacks can lead to the compromising of any of the company’s data.…

    • 870 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Canadian Tire Case

    • 656 Words
    • 3 Pages

    There are many options the company can take to resolve this issue. The first option is to continue working on the project in the manner it is now. It will eventually get done and it will not put a strain or pressure on current users. However, because this is a reactionary form of BI Maturity, much time is spent resolving issues and has little time to focus on the future of the project.…

    • 656 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 4 MBSA Scan IT1400

    • 527 Words
    • 3 Pages

    Result: The Automatic Updates feature has not been configured on this computer. Please upgrade to the latest…

    • 527 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    In Outlook, I am no longer able to click on links in emails or documents. I get an error message that says “This operation has been canceled due to restrictions in effect on this computer. Please contact your system administrator.”…

    • 769 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    WILHELM, M. (2013, Febuary 23). Recently hacked, here’s Microsoft’s statement on pending cybersecurity legislation. Retrieved from THE NEXT WEB:…

    • 276 Words
    • 2 Pages
    Good Essays
  • Better Essays

    We can trace all above issues from internal environment of Microsoft and external environment as follows:…

    • 1802 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Option 1. Use anti-malware software (say, Malwarebytes) to remove malicious documents and also CCleaner to correct browser settings and uninstall related anti-virus and third-party applications.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    · Latest editions of internet security software should not affect access unless settings have been changed. You…

    • 400 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    pagaakoh

    • 2675 Words
    • 11 Pages

    v1.0.10 – 10/4/03 - Fixed bug that caused dialog box to flash just before computer is rebooted.…

    • 2675 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Installation of Kaspersky

    • 263 Words
    • 2 Pages

    Click on Computer security is at risk. If following menu is not coming .Then go to update and update it at least once and reboot it.…

    • 263 Words
    • 2 Pages
    Satisfactory Essays