Long answer: Bob Bobson is a security analyst for Goldmine Tech. He recently received a tip from a government agency that the nefarious cybercriminal “Zero Cool” has boasted on an underground internet forum that he is actively infiltrating the Goldmine Tech computer network. What intrusion detection measures can he possibly employ to detect Zero Cool's activities? In your opinion, what are the pros and cons of each?
ANS :
Step 1 : Run Updated Antivirus Software
Step 2 : Check Task Manager for unneccessary/suspecious process to delete
Step 3 : Check System Integrity Checker
Step 4 : Check Network Connections with Netstat (netstat -ano)
Step 5 : Check Network Connections with WireShark software
Step 6 : Train your employees to thwart attacks.
Step7 : Checking appropriate security programs are using or not.
Step8 : Enforce appropriate authentication
Step9 : Secure third-party services
Step10 : Understand the vulnerabilities that remain
Step11: Create a strong culture of cyber security
Here are few tips that can help you protect against from attacks:
1. Make your password harder to hack
2. Change your password regularly
3. Clear your browser history
4. Do not use free Wi-Fi in organization system
5. Use HTTPS
6. Watch what you click
7. Try not to use public computers
8. Use anti-virus protection
9. Be careful while using thumb drive
Long answer: Bob Bobson is a security analyst for Goldmine Tech. He recently received a tip...