After a security breach in which important corporate secrets were lost, the Alex
ID: 3919260 • Letter: A
Question
After a security breach in which important corporate secrets were lost, the Alexander Rocco Corporation hired you to conduct a security test and offer recommendations for preventing future attacks. Computer forensics specialist Nathan Rosswog has informed you that the hackers got in by compromising a Web site many employees visit; this attack installed Trojan code on users’ workstations by using a drive-by download. Because the company’s antivirus software didn’t detect the code on workstations, attackers were able to launch reverse Telnet command shells and upload confidential documents to hacker-controlled Web sites. To do this, they used a port that allowed outbound HTTPS traffic through the company firewall.
a. Based on this information, write a brief report on your recommendations for configuring or revamping the network to defend against these types of threats. The report should give specific examples of how to secure the network, but not rely on a single type of network protection system, and make hardware recommendations, if needed.
Explanation / Answer
Q1) Based on this information, write a brief report on your recommendations for configuring or revamping the network to defend against these types of threats. The report should give specific examples of how to secure the network, but not rely on a single type of network protection system, and make hardware recommendations, if needed.
Please let me know in case of any clarifications required. Thanks!
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.