Preview

Unit 2 Assignment 1: Calculate the Window of Vulnerability

Satisfactory Essays
Open Document
Open Document
274 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 2 Assignment 1: Calculate the Window of Vulnerability
To resolve the issue of the window of vulnerability (WoV), we would need to get the patch from Microsoft. According to Microsoft, it will take up to 3 days for the patch to be available. Then, we would need additional time to download and test the patch to make sure that this is what is needed to fix the security breach on the SMB server. After doing the testing, the IT department would need time to install the patch onto the servers and deploy to the client computers. This will take 2 days to do, depending on the IT staff, if they work on weekends will determine the completion date. Meaning, if they will work on the weekend, then the deployment to all computers and servers will be done by that Sunday. If not, then it will be the following Tuesday. So, the time that is needed would be a week.
To recap, the security breach was reported on a Friday. On Monday, looked on Microsoft’s website to see when the patch would be released, and it indicated that it would take 3 days for it to be available. Counting Monday, 3 days would be, Wednesday. Depending on the time that the patch is released on Wednesday, would need an additional 2 days to download and test the patch before deploying, if early Wednesday, then Thursday to test. But if it comes late Wednesday, then it would take Thursday and Friday to test. Then that would leave the weekend, if the IT staff would work on the weekend. But if not, then it is going to restart on Monday and complete on

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 8 Assignment 1

    • 1415 Words
    • 6 Pages

    This project used an Atmega644 microcontroller clocked at 20MHz in each of the two functional modules for processing. Memory storage is provided by a standard Secure Digital (SD) card. Xbee modules provide bidirectional wireless communication and we use the TLV5616 DAC chip for generating analog audio. The LM358 dual op amp provides active filtering to the output of the DAC. Music files can be added to the SD card using any computer with a multimedia card reader. Once the base station detects an SD card inserted into the holder, it awaits data requests from the portable module. The portable module requests data when required and feeds these values into the DAC. The DAC output is low-pass filtered by the op amp, which also buffers the DAC output before it reaches the audio output…

    • 1415 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    It is important to test the cables before you install them and after they are installed. Although there are many tools that are used for testing the cables in a network this paper is only going to talk about three. The first one is the multifunction cable scanner, they are available for testing both copper and fiber optic cable. One such model is the Hobbes 258898 it can test every pin of almost 20 often used cables from coax to 40 pin ribbon cables. It identifies opens, shorts and mis-wires at the pin level. With a multifunction cable tester you can perform a range of tests that you would normally need a few different testers to do. You can do wire-mapping, test for the length of the cable, test the attenuation, and you can test NEXT (near end crosstalk) for copper cables. They will also test for optical power and signal loss in fiber optic cables. A lot of the multifunction cable testers perform other more comprehensive test such as PS-NEXT, ACRF, PS-ACRF, delay…

    • 659 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Grandfather – father – Son: According to this backup rotation schedule incremental backups are performed daily, while full backups are done weekly and monthly.…

    • 770 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The time between each of these areas or, the vulnerability’s lifecycle is divided into three risk areas. These areas are listed below and explained briefly.…

    • 350 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    a. The time in hours, minutes, and seconds is to be passed to a function named totsec().…

    • 720 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    cout << "You are in factorial program of C++. Please enter a +ve integer:- ";…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I recently had to deal with a problem with the Event Name as: BlueScreen. The Locale ID of the fault can be designated by the numerical value as: 5146. I am a touch apprehensive as to whether such a typical fault has been triggered owing to a virus attack. What should I do to eliminate the fault and ensure that the problem does not occur all over again?…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? ( choose two answers)…

    • 957 Words
    • 4 Pages
    Good Essays
  • Good Essays

    If you would like these actions to be notified to all your employees regarding this system update through email. We will give it 2 Days regarding the system update to notify all groups.…

    • 308 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    When addressing system performance, a key element that is often overlooked is Disk Fragmentation. Even on a brand new system with plenty of RAM and processing speed, the performance of the hard disk may be a bottleneck causing issues. It takes time to load large data files into memory - issues become particularly noticeable when dealing with movies, video clips, database files or image files which may easily be several gigabytes in size. On a freshly formatted disk, these files load fairly quickly. Over time, however you may start to notice performance issues - caused by disk fragmentation.…

    • 356 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    An extra layer of authentication for the security of resources by two-step verification. The combination of any two or more veri-fication methods (password, biometrics, trusted device).…

    • 553 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Unit 3: Health & Safety in the Health & Social Care Workplace The Impact of Health & Safety Requirements on Customers Steph Homer 1 Risk Assessment: ‘A systematic process of evaluating the potential risks that may be involved in a projected activity or undertaking’ - (Oxforddictionaries.com, 2014) 2 Risk Assessment Potential Risk or Hazard Who may be effected?…

    • 542 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    HT 26.5 RV Analysis

    • 110 Words
    • 1 Page

    Jayco Eagle HT 26.5 RLS "Rear living suite" Fifth wheel RV is like new with two slides "one bedroom and one living room slide". and 1/2 Ton towable The unit has never been smoked in or had any pets in it. features include a queen size bed "with orginal shipping plastic still on mattress", electric air mattress sofa, full bathroom, two rockers, booth style table, LED TV, DVD Player, AM FM CD Stereo and electric awning, electric jacks, outdoor shower, outdoor mini kitchen, vent covers, new tires and bike rack bracket installed. This RV also includes a king pin stabilizer, leveling blocks,and X-Block wheel chocks. Call or text 770-714…

    • 110 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Kathy, the project manager, obviously did not have the people skills or knowledge of the culture needed to be successful on this project. Had she researched the culture, listened to her team members, and worked with them rather than over them, this project would have been more successful. Also she should implement incentives for the team.…

    • 620 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Reliability Exercise

    • 631 Words
    • 3 Pages

    This test of novel problem solving is a measure of fluid intelligence (Doubleday, King, & Papageorgiou, 2002). People’s ability to solve novel problems is a stable characteristic, as it is largely genetically determined (Nairne, 2009). Test-retest is typically appropriate for measures with stable attributes, but this test’s novel nature makes it an inappropriate technique in regard to reliability. In effect, its novelty diminishes after the initial testing, producing difficulties due to practice effects, reactivity, or both. Since it has just 20 questions, furthermore, it is easier for examinees to remember a significant portion of its items and therefore either to remember the answers during the retest or to seek them out during the interval, resulting in erroneous score improvements (Yu, 2005). As it is impossible to discern the precise influences of any one factor, the interpretation of a test-retest coefficient is challenging, and with more appropriate reliability measures available temporal stability should not be used for this test.…

    • 631 Words
    • 3 Pages
    Good Essays