issc431 discussion reponse

Are you pressed for time and haven’t started working on your assignment yet? Would you like to buy an assignment? Use our custom writing services for better grades. Even if your deadline is approaching fast, our writers can handle your task right when you need it.


Order a Similar Paper Order a Different Paper

Hello,

I need two responses of at least 150 words each for the below students discussions for this week. Also in the bold below are the questions the students at answering.

For this assignment, answer the following:

  • How do you remove a key logger?
  • What is the difference between black box testing and white box testing?
  • What can you do to prevent a port scan?

Student one:

How do you remove a key logger?

A key logger is essentially a very nasty virus. All servers should have anti-virus and malware protections in place with specialized software or through intrusion detection or intrusion protect tools. Once the key logger is detected, it can be removed through the anti-virus software, or through other tools. Both Bitdefender and Malwarebytes (well respected security companies) provide specialized key logger removal tools. The key is prevention wherever possible, and detection and clean up if necessary. (Cooper, 2018)

What is the difference between black box testing and white box testing?

Black box testing is conducted by a tester who is blind to the system configuration. The tester does not know how the system is configured or what infrastructure is in place. This is generally done as an external test to simulate an attack from the outside by a malicious entity that has little to no knowledge of the system. White box testing is designed to simulate an internal threat who has experience or some information about the system and how it is configured. (Basta, Zgola, & Bullaboy, 2012)

What can you do to prevent a port scan?

It is difficult to prevent someone from running a port scan against a system from the outside. Port scanning tools can be blocked inside an Enterprise network, but there is little that an administrator can do about the people outside the network who might attempt to run a port scan against any publicly available hosts to see what ports are open. However, an administrator can take measures to ensure that the externally facing hosts provide as little information as possible. This can be accomplished by blocking or disabling ports that do not need to be active and using a firewall to block port scanning traffic and protocols. An administrator can also use third party tools to monitor the IP addresses that hit the ports on the servers, and how frequently those IP Addresses probe the servers. If an IP address probes a server very frequently on multiple ports, then that is an indicator that port scanning is occurring and the IP address can be blocked automatically. (Shaw, 2019)

References

Basta, A., Zgola, M., & Bullaboy, D. (2012). Database security. Boston, MA: Course Technology/Cengage Learning.

Cooper, S. (2018, March 26). What is a keylogger and how can you avoid, detect and remove them. Retrieved June 26, 2019, from https://www.comparitech.com/blog/vpn-privacy/what-is-keylogger/

Shaw, C. (2019, February 6). Port Scanning: Detect Malicious Network & Port Scanner Requests. Retrieved June 26, 2019, from https://www.extrahop.com/company/blog/2016/how-to-recognize-malicious-network-scanning-port-scanning/

-Leah

Student two:

First, I would like to say I have enjoyed the past eight weeks in this course and the opportunity I had to learn from each person in this class. It always amazes me that we are already starting our final week in this course and hope to see each of you again in a future class.

So what is a keylogger to begin with? A keylogger is malware that can detect and record an individual users keyboard and mouse inputs. This allows every key that has been typed and each click of the mouse to be recorded for view at a later date, compromising sensitive data such as passwords, pin numbers, and other personally identifiable information. If a keylogger is suspected using an onscreen keyboard will allow a user to type without giving up information as he/she did so.

To remove a keylogger it first has to be detected by searching through the running processes. One the process is found using the task manger a user can click the end process button and terminate the process. This prevents the keylogger from recording any information until the computer restarts, as this does not uninstall the keylogger only disables it. Next run an anti-virus/anti-malware scan to see if it can detect and remove the keylogger. If it is unable to do so a user can manually remove the keylogger as it is normally located in the system files. However, it is imperative that the user knows for sure that the files/folders being deleted are the keylogger and not a true system file. One paid method that a user can use to remove a keylogger vulnerability is Anti-keylogger. If the anti-keylogger detects any potential keylogger it stops the program and requests the user to verify prior to deletion.

Black box testing is when software is tested without knowing what the structure of the program code is. White box testing is the opposite, it is when the code and its structure is known to the tester.

The easiest method to ensure a port scan is not productive or anyone is to set your firewall with all unneeded ports closed and a policy of no reply to any requests. If all requests are ignored and no reply is sent a threat actor will be unable to determine that a computer exists on the IP.

References

Difference between Black Box Testing and White Box Testing – Software Testing Class. (n.d.). Retrieved from https://www.softwaretestingclass.com/difference-between-black-box-testing-and-white-box-testing/

How to protect against port scans. (n.d.). Retrieved from SearchSecurity website: https://searchsecurity.techtarget.com/answer/How-to-protect-against-port-scans

How to Remove a Keylogger. (n.d.). Retrieved from http://www.tech-faq.com/how-to-remove-a-keylogger.html

Writerbay.net

Most students find it hard to finish papers at some point in their studies. If it ever happens to you, don’t get desperate—we have a service for every writing emergency! Whether you’re stuck with a problem, equation, or a piece of creative writing, we will definitely come to your rescue. Fill in the order form with the details of your paper. Write your personal instructions so we can meet your expectations.


Order a Similar Paper Order a Different Paper