I’m trying to study for my Computer Science course and I need some help to understand this question.
Scenario: An intern employee names James has found a USB on the ground coming into work, he wants to find the owner. He plugs the USB drive into his workstation computer and the drive appears to be empty. He sees that the command prompt flashes open and closes. Unknowingly he just executed a worm or botnet into the network. He informs you (the CIO) that he believes that he has unleashed a worm.
Task: How would you track, and remove the worm the network?
Areas to consider:
What ports or port types will have unusual activity.
Is simply hiding vulnerabilities and other system architecture information a solid method of defense? What methods would you suggest?
Each Question 500 Words
WHY SHOULD YOU HIRE EXPERT ACADEMIC WRITERS?
Answering this question is not essay as it seems. It will require you to research or burn your brain power, write your findings down, edit, proofread severally, and submit unsure of the grade you will get. Essay96.com assignment writers are offering to take care of that. Order your assignment now, relax, submit, and enjoy excellent grades. We guarantee you 100% original answers, timely delivery, and some free products.