Operating Systems

Discuss common forms of attack on Microsoft systems using the Internet, and/or your job as reference for full credit

  1. Read the week 1 article on installation and deployment of Windows Server 2012 and list 5 concerns that could result in vulnerabilities during installation.
  2. Discuss three basic network components and how they are used today.

Full Answer Section

     
  • Phishing: Phishing emails or websites attempt to trick users into revealing sensitive information like usernames, passwords, or credit card details. These emails or websites often appear to be legitimate, mimicking trusted sources like banks, social media platforms, or even colleagues.
  • Zero-Day Exploits: These are vulnerabilities in software that the vendor is unaware of. Attackers exploit these vulnerabilities before a patch is available, potentially causing significant damage.
  • Denial-of-Service (DoS) Attacks: These attacks overwhelm a system with traffic, making it unavailable to legitimate users. Attackers can target web servers, email servers, or other critical infrastructure.
  • SQL Injection: This attack targets websites or applications that use SQL databases. Attackers can inject malicious code into user input forms to gain unauthorized access to sensitive data within the database.
  • Password Attacks: These attacks attempt to guess or crack user passwords. They can use techniques like brute-force attacks (systematically trying every possible combination) or dictionary attacks (using common words or phrases).
  • Watering Hole Attacks: Attackers compromise legitimate websites that a specific target group frequents. When users from the target group visit the compromised site, they become infected with malware or have their data stolen.
These are just some of the common attack methods. It's crucial to stay updated on the latest threats and implement robust security measures to protect your Microsoft systems.
  1. Potential Vulnerabilities During Windows Server 2012 Installation
Here are 5 concerns that could introduce vulnerabilities during a Windows Server 2012 installation:
  1. Insecure Network Connection: If the installation is performed over an unsecured network, attackers could potentially intercept sensitive data, such as passwords or product keys.
  2. Weak or Default Passwords: Using weak or default passwords for administrator accounts creates a significant security risk. Attackers can easily guess these passwords and gain unauthorized access to the server.
  3. Failing to Install Security Updates: Newly installed operating systems often require security updates to address known vulnerabilities. Skipping these updates leaves the server exposed to exploits.
  4. Improper Configuration of Security Features: Windows Server 2012 comes with various security features like firewalls and user permissions. Improper configuration of these features can leave the server vulnerable.
  5. Installing Unnecessary Software: Installing software that is not required for server operation increases the attack surface and potential vulnerabilities. It's important to follow the principle of least privilege and only install what's essential.
  6. Basic Network Components and Their Uses Today
Networks connect devices and allow them to share resources and communicate with each other. Here are three basic network components and their modern applications:
  1. Network Devices: These are physical devices that facilitate communication between devices on a network. Examples include routers, switches, firewalls, and modems.
    • Routers:Route data packets across different networks, directing them to the correct destination. They play a crucial role in connecting local networks to the wider internet.
    • Switches:Connect devices within a local network (LAN) and manage data flow between them. Modern switches are often intelligent and can prioritize traffic for optimal performance.
    • Firewalls:Act as a security barrier, filtering incoming and outgoing traffic based on predefined security rules. Firewalls help to protect networks from unauthorized access and malicious attacks.
    • Modems:Modulate and demodulate signals, allowing communication between digital devices and analog communication lines (like phone lines or cable lines). While traditional modems are still used in some cases, many internet connections today utilize fiber optic cables which don't require modulation.
  2. Network Media: This refers to the physical cables or wireless signals that carry data between network devices. Common network media include:
    • Copper Cables:Twisted-pair and coaxial cables are traditional options for wired networks.
    • Fiber Optic Cables:Transmit data using light pulses, offering much faster transmission speeds and greater distances compared to copper cables.
    • Wireless Signals:Wi-Fi and cellular networks use radio waves to transmit data wirelessly, enabling mobile connectivity for devices.
  3. Network Protocols: These are sets of rules that define how data is formatted, transmitted, and received on a network.
 

Sample Answer

   

1. Common Attacks on Microsoft Systems via the Internet

Microsoft systems are popular targets for cyberattacks due to their widespread use. Here are some common attack methods leveraged through the internet:

  • Malware: This malicious software can take various forms, including viruses, worms, Trojan horses, spyware, and ransomware. Attackers can trick users into downloading malware through phishing emails, malicious websites, or infected attachments. Once installed, malware can steal data, disrupt operations, or hold files hostage for ransom.