1 / 5100%
Running Head: INFRASTRUCTURE ADMINISTRATION 1
Apply:i Signaturei Assignment:i AntiVirusi andi NMAPi Scans
CYBi 205ii i Infrastructurei Administration
INFRASTRUCTURE ADMINISTRATION 2
Mosti networki breachesi goi undetectedi fori weeksi ori eveni months,i andi ani attackeri usuallyi
takesi stepsi toi goi undetected.i Withi thati ini mind,i writei ai shorti paragraphi describingi howi
thei DEFAULTi Windows®i firewalli andi securityi settingsi mighti contributei toi thisi
inabilityi toi detecti ani attackeri probingi fromi insidei youri network.
Thei fundamentali goali ofi attackingi thei defensei ofi ai networki isi toi depletei itsi resourcesi
soi thati thei networki isi forcedi toi shuti down.i Ini thisi way,i thei networki cannoti providei itsi servicesi
fori ai prolongedi periodi ofi time.i Ai certaini typei ofi attacki isi ai protocoli attacki thati aimsi ati
breakingi downi thei firewalli andi loadi balanceri programsi soi thati thei websitei isi unablei toi processi
goodi qualityi traffici (Johansen,i 2020).i Defaulti securityi settingsi ini generali doi noti providei
enoughi securityi asi theyi arei setupi fori functionalityi overi security.i i Specifici toi Windowsi
Securityi Settingsi andi Defaulti Firewalli Settings,i theyi doi noti protecti fromi traffici originatingi ini
thei internali network.
Firewallsi keepi ai websitei ori networki secure,i buti theyi cani alsoi bei overwhelmedi withi ai
flurryi ofi protocoli attacks.i Therei isi noi particulari fixi fori suchi attacksi becausei youri businessi
organization'si networki hasi manyi weaknessesi thati cani bei exploitedi throughi differenti attackingi
strategies.i
Describei thei complicationi ini thei AntiVirusi andi NMAPi scani processi fori ai largei
Enterprisei networki withi overi 1000i computersi asi opposedi toi ai smalli threei computeri
network?
Enterprisesi attacksi arei much-targetedi attacks.i Toi carryi outi ani enterprisei attack,i
hackersi observei thei personali behaviori andi informationi ofi thei employeesi ofi ai certaini
organization.i Thei hackersi observei theiri likes,i dislikesi asi welli asi thei websitesi theyi visit.i Thei
hackersi thusi tryi toi gaini accessi toi thei people.i Thei hackersi figurei outi theiri laptopi operatingi
systemi andi personali emaili addressesi soi thati theyi cani gaini accessi toi individuali computersi oni ai
network.i Ifi ai networki hasi numerousi computers,i iti isi easieri toi accessi ai networki (Networki
INFRASTRUCTURE ADMINISTRATION 3
Vulnerability:i Networki Securityi Vulnerabilities.i Networki Vulnerabilityi |i Networki Securityi
Vulnerabilities,i 2020).i Complicationsi ofi scanningi ai largei network:i i Iti takesi morei time.i i Therei
arei ai loti morei resultsi thati havei toi bei reviewedi andi handled.
Consideri ai cloud-hostedi Infrastructurei asi ai Servicei (IaaS)i environmenti withi manyi new,i
internet-accessiblei systemsi regularlyi beingi builti andi broughti online.i Describei thei
challengesi ini preventingi attacksi ini thisi environment?
Withi cloudi services,i thei networki hasi ai scalablei onlinei platformi thati helpsi thei
organizationi handlei ani increasedi leveli ofi worki withouti anyi malfunction.i Cloudi computingi
offersi ani advantagei ofi computingi abilityi andi economici scalei thati worksi besti fori alli kindsi ofi
organizations.i Smalli scalei andi mediumi leveli organizationsi cani easilyi enhancei theiri ITi
efficiencyi withi cloudi services.i Thei small-scalei andi medium-leveli enterprisesi doi noti havei toi
completelyi investi ini high-leveli infrastructure.i Oni thei otheri hand,i theyi cani providei uniquei
servicesi toi theiri clientsi usingi scalablei technology.i Thisi way,i thei enterprisesi arei investingi ini
actuali capacityi ITi infrastructurei buti cani cateri toi fluctuatingi demandi fori services.i Thei
enterprisesi cani theni reducei thei actuali capacityi ori increasei iti peri convenience.i Enterprisesi cani
dependi oni rentedi serveri spacesi withouti worryingi abouti fullyi upgradingi thei existingi serveri
spaces.i Thei enterprisesi alsoi commandi thei flexibilityi toi hosti thei virtuali ITi infrastructurei wheni
necessaryi throughi cloudi servicesi ati locationsi thati offeri thei lowesti costs.i Thei enterprisesi nowi
cani havei optimizedi ITi infrastructuresi withouti thei costsi inflictedi oni thei organizationi
(Johansen,i 2020).i
Finally,i concludei thisi week'si assignmenti withi ai pagei explainingi howi thei samei typesi ofi
toolsi demonstratedi ini thisi labi ori discoveredi ini youri researchi mighti bei usedi byi ani
infrastructurei administratori toi helpi securei ani environment.
INFRASTRUCTURE ADMINISTRATION 4
Networksi acti asi easyi targetsi fori hackersi andi otheri attackers.i Thisi happensi becausei
mosti ofi thei networksi doi noti havei thei securityi leveli ofi generali desktopsi andi servers.i Somei
networki devicesi likei smalli officei devicesi andi homei officei devicesi runi anti-virusi andi
maintenancei programsi thati protecti general-purposei hostsi (Johansen,i 2020).i Manyi
manufacturersi producei thesei devicesi ini bulk.i Thesei devicesi havei thei benefiti ofi operations,i
maintenance,i andi installation.i Operatorsi doi noti usuallyi changei defaulti settingsi ori hardeni themi
fori use.i Theyi alsoi doi noti performi regulari patching.i Thei manufacturersi alsoi faili toi replacei ai
devicei oni ai customer'si premisesi oncei thei devicei isi noti supportedi byi thei manufacturers.i
Operatorsi alsoi faili toi investigatei anyi networki devicei breachi properlyi ini casei ofi cyberi
intrusions.i
INFRASTRUCTURE ADMINISTRATION 5
References
Johansen,i A.i G.i (2020).i Whati isi ai firewalli andi doi youi needi one?i NortonLifeLock.i
https://us.norton.com/internetsecurity-emerging-threats-what-is-firewall.html.i
Networki Vulnerability:i Networki Securityi Vulnerabilities.i Networki Vulnerabilityi |i Networki
Securityi Vulnerabilities.i (2020).i https://www.redteamsecure.com/blog/the-most-
common-types-of-network-vulnerabilities.i
Students also viewed