You are a network analyst. AtWork, who is your customer, has
around 450 employees in their company. This time, the company came
for your advice as their employees have been frustrated with
increasing spam emails, its computers also crash frequently, take a
long time to start up or shut down. Furthermore, your customer
mentioned that the programs are running very slowly.You told your
customer that you think some or all of the company’s computers
might be a part of some botnets. Given your comment, your customer
would like to understand how their computers became a part of some
botnets as well as how their computers are controlled and
manipulated remotely. Your customer has heard about
honeypots/honeynets and network separation although does not really
understand how they work. Your customer was wondering if the
honeypots/honeynets and network separation can be useful to the
company in mitigating future attacks. They also want to know if
there are other recommendations apart from using
honeypots/honeynets and network separation.
Mitigation Strategies:
4.1Propose appropriate strategies to the client that should be
adopted in the organisation in order to reduce the chances of
another attack.
4.2 Make recommendations on what could be done to make the
organisation’s networka safer place. Explain how encryption such as
symmetric and Asymmetric will help in this situation quoting
examples.
You are a network analyst. AtWork, who is your customer, has around 450 employees in their company. This time, the compa
-
- Site Admin
- Posts: 899603
- Joined: Mon Aug 02, 2021 8:13 am