CYB 240 Module Four Lab Worksheet Shane Mallory
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
240
Subject
Computer Science
Date
Feb 20, 2024
Type
docx
Pages
4
Uploaded by JudgeSquirrelPerson759
CYB 240 Module Four Lab Worksheet
Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information.
Lab: Remote and Local Exploitation
Prompt
Response
In the lab section “Privilege Escalation,” Step 8
, insert your name at the command line below the output and include it in your screenshot.
Privilege escalation is a topic that is recurring throughout cybersecurity. What does the term mean, and why should security specialists be concerned about it?
Privilege escalation is a method used by threat actors to gain unauthorized access to a system's functions and/or data, and often involves exploiting a bug present in the network or system. Security specialists should take extra care in reducing the chances of this vulnerability being exploited as depending on its severity it can cause irreversible harm to a network or system. Once an attacker has gained elevated privileges they can bypass security controls, manipulate or delete sensitive data, and if given enough time, establish persistent access to the compromised system.
Lab: HTMLi Vulnerability and Mitigation
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Task Instructions
X
Protect the current worksheet, letting users select both
locked and unlocked cells, but only make changes to
unlocked cells. Use the password cengage to prevent
unauthorized changes to the worksheet protection
settings.
arrow_forward
Case Project 10-1: Password Security
Inadequate password security is one of the areas that the auditors believe needs improve-ment. A former server administrator acquiesced to bank employees’ complaints about fre-quent password changes and set very lax account policies for passwords. The audits raised the following concerns:
Some bank employees have used the same user account password for several years.
Many of the existing passwords are only four or five characters in length.
Several bank employees regularly change their passwords but rotate between the same three or four passwords with each change.
An employee who has forgotten a password can keep trying different combinations for as long as they like, until they hit upon the password or give up trying.
What capabilities in Windows Server 2016 enable the bank to address the auditors’ concerns? Create a detailed report of your recommendations for the bank’s Audit Response Committee. Also, for the IT manager who is a committee…
arrow_forward
Business Rules:
Each musician at NewTalent should have a name, address, and phone number on the system. The Instruments used in the songs have a unique name, musical genre (i.e. rock, pop, hip hop), and type (i.e. string, piano, guitar). Every album recorded under the NewTalent label has a title, copyright date, format, and an album identifier. Each song recorded has a title and an author. Musicians can play several instruments, and an instrument can be played by multiple musicians. Every album contains several songs, but a song can only appear on one album. Songs are performed by one or more musicians, and a musician can perform numerous songs. Each album has one musician acting as its producer, although a musician can produce multiple albums.
Create an ERD for the above scenario that describes its business rules.
Use Crow's Foot notations and make sure to include all of the following:
All entities correctly identified with Primary key and any foreign key attributes.…
arrow_forward
Workers:
Name
Worker ID
Department
Job Title
Basic Salary
Age
Date of Birth
Passport Details
The system should store details of each worker including their personal information, job-related details, and passport information for identification purposes.
Parties:
Party ID
Type
Theme
Date
Time
Duration
Venue Address
Client ID
Guest List
Catering Company
Cleaning Company
Decorations Company
Entertainment Company
Furniture Supply Company
Invoice
Each party should have a unique identifier along with details such as type, theme, date, time, and duration. It should also track the venue address, client details, guest list, and the various suppliers involved in organizing the party. Additionally, invoices generated for the party should be recorded.
Clients:
Client ID
Name
Address
Contact Details
Budget
Client details including their name, address, contact information, and allocated budget should be stored for each party.
Guests:
Guest ID
Name
Address
Contact Details
The system…
arrow_forward
write access model Only Leena can access her laptop. The website can be accessed only during work time The file is a read-only file. Only course instructors can access students' data.
arrow_forward
An Art Museum needs to keep track of its artwork and exhibitions. The museum has a collection of
artwork. Each piece of art has a unique id [ArtID], an artist, year and title.
Artwork is categorized by type. There are two types, paintings and sculptures. Paintings have a
paintType and style. Sculptures have a material, height and weight.
Artwork is frequently shown in exhibitions. Each exhibition has a unique name, startDate, endDate.
A listing of the artwork displayed at an exhibition is also retained.
Below is an E-R diagram for a database to help the Art Museum. Provide appropriate names for
entities E1, E2, E3, E4 identifiers 11, 12, 13, 14 missing attributes and relationship cardinality RC1
and relationship type RT1.
Start_date
End_date
E1
E1
11
RC1
PaintType
Style
E3
13
A1
Title
Year
A/
A
A/
A/
A/
A/
A/
A/
A
A/
A/
E2
12
A/ E2
E3
E4
11
12
13
14
A1
A2
RC1
RT1
RT1
A2
Height
Weight
E4
14
Activate
Go to Settin
arrow_forward
Force Completion This test can be saved and resumed at any point until time h
This test does not allow backtracking. Changes to the answe
Your answers are saved automatically.
Remaining Time: 27 minutes, 16 seconds.
* Question Completion Status:
A Moving to the next question prevents changes to this answer.
Question 1
The Initial phase in the development of information system is:
O System Testing.
System Design
System Analysis.
System investigation
A Moving to the next question prevents changes to this answer.
f1
f2
f3
f4
f5
@
%24
%23
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Related Questions
- Task Instructions X Protect the current worksheet, letting users select both locked and unlocked cells, but only make changes to unlocked cells. Use the password cengage to prevent unauthorized changes to the worksheet protection settings.arrow_forwardCase Project 10-1: Password Security Inadequate password security is one of the areas that the auditors believe needs improve-ment. A former server administrator acquiesced to bank employees’ complaints about fre-quent password changes and set very lax account policies for passwords. The audits raised the following concerns: Some bank employees have used the same user account password for several years. Many of the existing passwords are only four or five characters in length. Several bank employees regularly change their passwords but rotate between the same three or four passwords with each change. An employee who has forgotten a password can keep trying different combinations for as long as they like, until they hit upon the password or give up trying. What capabilities in Windows Server 2016 enable the bank to address the auditors’ concerns? Create a detailed report of your recommendations for the bank’s Audit Response Committee. Also, for the IT manager who is a committee…arrow_forwardBusiness Rules: Each musician at NewTalent should have a name, address, and phone number on the system. The Instruments used in the songs have a unique name, musical genre (i.e. rock, pop, hip hop), and type (i.e. string, piano, guitar). Every album recorded under the NewTalent label has a title, copyright date, format, and an album identifier. Each song recorded has a title and an author. Musicians can play several instruments, and an instrument can be played by multiple musicians. Every album contains several songs, but a song can only appear on one album. Songs are performed by one or more musicians, and a musician can perform numerous songs. Each album has one musician acting as its producer, although a musician can produce multiple albums. Create an ERD for the above scenario that describes its business rules. Use Crow's Foot notations and make sure to include all of the following: All entities correctly identified with Primary key and any foreign key attributes.…arrow_forward
- Workers: Name Worker ID Department Job Title Basic Salary Age Date of Birth Passport Details The system should store details of each worker including their personal information, job-related details, and passport information for identification purposes. Parties: Party ID Type Theme Date Time Duration Venue Address Client ID Guest List Catering Company Cleaning Company Decorations Company Entertainment Company Furniture Supply Company Invoice Each party should have a unique identifier along with details such as type, theme, date, time, and duration. It should also track the venue address, client details, guest list, and the various suppliers involved in organizing the party. Additionally, invoices generated for the party should be recorded. Clients: Client ID Name Address Contact Details Budget Client details including their name, address, contact information, and allocated budget should be stored for each party. Guests: Guest ID Name Address Contact Details The system…arrow_forwardwrite access model Only Leena can access her laptop. The website can be accessed only during work time The file is a read-only file. Only course instructors can access students' data.arrow_forwardAn Art Museum needs to keep track of its artwork and exhibitions. The museum has a collection of artwork. Each piece of art has a unique id [ArtID], an artist, year and title. Artwork is categorized by type. There are two types, paintings and sculptures. Paintings have a paintType and style. Sculptures have a material, height and weight. Artwork is frequently shown in exhibitions. Each exhibition has a unique name, startDate, endDate. A listing of the artwork displayed at an exhibition is also retained. Below is an E-R diagram for a database to help the Art Museum. Provide appropriate names for entities E1, E2, E3, E4 identifiers 11, 12, 13, 14 missing attributes and relationship cardinality RC1 and relationship type RT1. Start_date End_date E1 E1 11 RC1 PaintType Style E3 13 A1 Title Year A/ A A/ A/ A/ A/ A/ A/ A A/ A/ E2 12 A/ E2 E3 E4 11 12 13 14 A1 A2 RC1 RT1 RT1 A2 Height Weight E4 14 Activate Go to Settinarrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:Cengage
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage