IT 262 Walden Unit 8 Investigating and Responding to Security Incidents Lab Report

Unit 8 Lab: Investigating and Responding to Security Incidents

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Outcomes addressed in this activity:

Unit Outcome:

  • Describe malware, viruses, and worms.
  • Course Outcome:

    IT262-4: Produce wireless attacks and malware.

    Save Time On Research and Writing
    Hire a Pro to Write You a 100% Plagiarism-Free Paper.
    Get My Paper

    Purpose

    What is the best response if an organization has been successfully attacked? Have a plan in place and ready to go is the best way to prepare for this eventuality. This plan needs to be stored in a secure off-site location in case a disaster makes the site inaccessible. This lab will provide you with insights into planning for security incidents.

    Lab Instructions

    This lab provides the hands-on element to your studies. It allows you to gain practical experience using the tools and techniques associated with ethical hacking.

    Access the lab link entitled “Investigating and Responding to Security Incidents” in this lab section.

    The following resources will help you get oriented in the lab environment: the

    Common Lab Tasks Manual

    and

    J and B Lab Tips

    . The manual will provide detail and the tips are a very abbreviated reference.

    Open a new Microsoft Word document and put your name and assignment number at the top.

    In the lab environment, you will find instructions for the specific lab, which can be downloaded. Follow the instructions.

    Complete the instructions in Step 1. Compile your lab report in the document with a title page and an easy to understand explanation of what you are doing and why you are doing it. Within your document, after your lab report, answer the question in Step 2.

    Conduct research and cite supporting sources in APA format where appropriate.

    Complete the following:

    Step 1:

    Open the lab entitled “Investigating and Responding to Security Incidents.”

    Click the “Start Lab” tab in the middle of the webpage.

    Review the following material in the lab environment:

  • Before you Begin
  • Introduction
  • Section 1. Hands-On Demonstration
  • When you are ready to begin click: “Section 2: Applied Learning.”

    Complete Parts 1, 2, and 3. Make sure to obtain the required screenshots that are noted in the online lab instructions.

    Step 2:

    Answer the following question in the lab document as part of the lab submission. Respond with a minimum of 250 words.

  • How exactly should you isolate an infected machine? What information might you lose if you powered the infected machine off?
  • Still stressed from student homework?
    Get quality assistance from academic writers!

    Order your essay today and save 25% with the discount code LAVENDER