Cumberland County Chapters 8 and 9 Track and Remove Botnet Attack Paper
Cumberland County Chapters 8 and 9 Track and Remove Botnet Attack Paper
Read chapters 8 and 9 (Required Text Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier. )
Scenario: An intern employee names James has found a USB on the ground coming into work, he wants to find the owner. He plugs the USB drive into his workstation computer and the drive appears to be empty. He sees that the command prompt flashes open and closes. Unknowingly he just executed a worm or botnet into the network. He informs you (the CIO) that he believes that he has unleashed a worm.
Task: How would you track, and remove the worm the network?
Areas to consider:
- What ports or port types will have unusual activity.
reference : 2 peer reviewed articles
"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.
Discount Code: CIPD30
Click ORDER NOW..
