Sample Essay on:
Computer Security Memo

Here is the synopsis of our sample research paper on Computer Security Memo. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This is a 3 page paper that provides an overview of computer security. It takes the format of an inter-office memorandum on security measures and outcomes. Bibliography lists 2 sources.

Page Count:

3 pages (~225 words per page)

File: KW60_KFsecop3.doc

Buy This Term Paper »

 

Unformatted sample text from the term paper:

a malicious IP address (178.17.164.141). As director of the security operations center for Bjornstrand, I was notified when it was discovered that the IP in question was on the security teams watch list and was associated with the distribution of malware. The determination was made that malware was the likely cause for the computer in questions "behind the scenes" communication with the malicious IP. In order to stop the communication and mitigate any damages, it was necessary however, to identify the particular piece of malware being used, so that the appropriate steps for its extraction could be followed. After running various system checks, it was determined that a Trojan downloader and a program for opening "backdoors" were associated with malicious processes and .dlls being run on the effected system. The observed behavior being consistent with these types of malware, the solution was accepted and the appropriate steps were taken to neutralize the threat, and then assess and mitigate any damages. Discussion: In order to accurately determine what particular piece of malware was impacting the system and allowing communication with an IP on the security watch list, it was necessary to employ two key diagnostic tools. These are the XP commands "netstat" and "tasklist". By running these commands, one can swiftly access critical information about the processes running on a system as well as any .dlls associated with those processes. An analyst for Bjornstrand was instructed to run these commands with appropriate switches on the infected system. To begin with, because the system was observed talking to a malicious IP without a user initiating that behavior, it became clear that the system had been infected with a malicious process that was doing the sending and receiving to that IP. The tool "netstat" can be used in order to ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now