Programming Question

Unit 2 Lab – Creating and Securing User Accounts and Detecting Malware

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Login Info Remains the SameUnit 2 Lab: Detecting Malware and Unauthorized Devices

Outcomes addressed in this activity:

Locate likely malicious software on a system.

Identify where the malicious software resides on the system.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Identify what registry changes have been made to make the malicious software persistent.

Course Outcome:

  • IT411-1: Examine digital forensics concepts and techniques.
  • Purpose
  • The purpose of this lab is to understand the security risk associated with rogue devices and malware by learning active and passive scanning techniques. You will also craft, deploy, and detect malware on a machine on a network.
  • Part 1 Lab: Detecting Malware and Unauthorized Devices

    Complete the lab “Detecting Malware and Unauthorized Devices” in the InfoSec Learning (ISL) environment located in Unit 2. Completion is automatically graded and posted to the Gradebook entry for the lab.

    Part 2 Assignment: Written Portion Requirements

    Unauthorized devices on a network are one of the most impactful things that can happen to a network and cause havoc to occur. Think about the impact that malware and unauthorized devices can have on a network and respond to the following questions.

    In 300 words or more, respond to the following:

    What are the different types of malware? Write a paragraph for each type that exists.

    What are some ways you can find rogue and unauthorized devices on a network?

    What are some preventative measures you can deploy and employ to address malware and unauthorized devices?

    Are you stuck with your online class?
    Get help from our team of writers!

    Order your essay today and save 20% with the discount code RAPID