StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Microsoft Baseline Security Analyzer - Assignment Example

Cite this document
Summary
The paper "The Microsoft Baseline Security Analyzer " discusses that after thorough analysis and assessment of the current version of the Microsoft Baseline Security Analyzer, it has been observed that there are several features that could be added to the MBSA. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful
The Microsoft Baseline Security Analyzer
Read Text Preview

Extract of sample "The Microsoft Baseline Security Analyzer"

One of the main reasons for emphasizing strong passwords is that despite the development and implementation of the latest technologies to protect secured information, the information can easily have unauthorized access if the user has not developed a strong password to secure its personal information. Moreover, most of the information leakage is due to the same reason, as a common hacker can attack the vulnerability of a weak password and break into your information (Green & Richard, 2011).

Question # 2 – Part c
The option of adopting the strong password policy set restricts the users to develop strong local account passwords. Therefore, after setting the strong password policy the user cannot develop a simple, easy-to-crack, blank, and/or password that is the same as the username to avoid hacking and information leakage vulnerability (Green & Richard, 2011).
Question # 3 – Part a
Malware attacks digital information in multiple ways. The Malware gets downloaded with the product being downloaded and starts working slowly with time. Some of the Malware irritates by displaying diverse pop-ups, as the malicious pop-up program runs secretly in the downloaded product (SpamLaws, n.d).
Question # 3 – Part b

Many types of Malware include but are not limited to Adware, Bots, Bugs, Ransomware, Rootkits, Spyware, Trojan horses, Viruses, and worms (Lord, 2011). Several software applications could be utilized in computers to prevent Malware including anti-virus and anti-adware.

Question # 4 – Part a
The Conficker is a computer worm that can infect a computer and widens itself automatically (without human interaction) to the other computer over the computer network. The Conficker worm attacks the computer network services through the internet on diverse Microsoft operating systems including Windows 2000, X, P, and Windows Server 2008, etc. Microsoft launches an out-of-band patch in 2008 to avoid the Conficker attacks (Microsoft, 2013).

Question # 4 – Part b
The organizations could use the MBSA to detect the missing patches by utilizing the security information automatically received through the application of Conficker programs in the computer systems. Moreover, the Windows operating system can automatically check the updates; therefore, the missing patches can easily be recognized by Microsoft. To protect the computer from unauthorized users, the MBSA should have the ability to turn off the computer after three incorrect password attempts. Moreover, the verification key can be introduced for proper authentication of the computer password. This feature would reduce the frequency of changing the password frequently as per the policy of the MBSA.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Microsoft BSA Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Microsoft BSA Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1620320-microsoft-bsa
(Microsoft BSA Assignment Example | Topics and Well Written Essays - 500 Words)
Microsoft BSA Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1620320-microsoft-bsa.
“Microsoft BSA Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1620320-microsoft-bsa.
  • Cited: 0 times
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us