Unit 2 Lab – Creating and Securing User Accounts and Detecting Malware
Login Info Remains the SameUnit 2 Lab: Detecting Malware and Unauthorized Devices
Outcomes addressed in this activity:
Locate likely malicious software on a system.
Identify where the malicious software resides on the system.
Identify what registry changes have been made to make the malicious software persistent.
Course Outcome:
Part 1 Lab: Detecting Malware and Unauthorized Devices
Complete the lab “Detecting Malware and Unauthorized Devices” in the InfoSec Learning (ISL) environment located in Unit 2. Completion is automatically graded and posted to the Gradebook entry for the lab.
Part 2 Assignment: Written Portion Requirements
Unauthorized devices on a network are one of the most impactful things that can happen to a network and cause havoc to occur. Think about the impact that malware and unauthorized devices can have on a network and respond to the following questions.
In 300 words or more, respond to the following:
What are the different types of malware? Write a paragraph for each type that exists.
What are some ways you can find rogue and unauthorized devices on a network?
What are some preventative measures you can deploy and employ to address malware and unauthorized devices?