The news is riddled with stories of malware exploits, ransomware of high-value t

WRITE MY ESSAY

The news is riddled with stories of malware exploits, ransomware of high-value targets, and significant financial loss from hackers. When watching the news it is common to consider those events as things that happen to someone else, but would never happen to us. Consider your computer. How would you know if you have been hacked? If you have anti-virus software you may receive a warning if malware is present. But what if the malware makes it past your anti-virus software and into your computer? How would you know your computer has been compromised? A slow computer could be caused by the network reaching bandwidth capacity, a hard drive that is malfunctioning, malware contaminating the system, your system having too many windows or terminals open at once, a network appliance failure on another part of the network causing traffic to be routed over the portion your system is using to communicate. Those items could be manifested in the system appearing to slow down or act sluggish. Each has a very different potential solution. Valuable time is wasted when attempting to determine what is causing an incident so it can be properly addressed and corrected.
Instructions
For this discussion you will identify a specific type of attack or hack and detail how it is manifested on the system and what signs you should look for in diagnosing this issue. You will also provide steps to eradicate the network or system of the issue so that proper function can be restored. There are potentially thousands of issues that could be discussed here, so select something not already posted by your classmates so that the largest pool of potential issues/diagnoses/fixes may be shared. Be sure to include the following in your response:
Name of the hack or attack
How it will manifest on a system (if multiple ways include all in your response)
How can this issue be diagnosed to ensure it is a problem?
What are the corrective measures that can be taken to eradicate the hack/attack and restore operations (include all necessary steps)
What issues could persist (such as if data has been deleted)? How can those issues be addressed and normal function restored?
What processes or actions should be changed going forward to prevent this from occurring again?
Cite all sources
Additional Resources
Kirvan, P. and Zola, A. (2022). Troubleshooting. TechTarget. Retrieved from https://www.techtarget.com/whatis/definition/troubleshooting
Enticknap, A. (2021). How to troubleshoot computer hardware problems. Retrieved from https://www.makeuseof.com/computer-troubleshooting/
Computer Hope (2020). Basic software troubleshooting. Retrieved from https://www.computerhope.com/issues/chsoft.htm

WRITE MY ESSAY

Leave a Comment