IT 262 Walden Unit 8 Investigating and Responding to Security Incidents Lab Report – Description
Unit 8 Lab: Investigating and Responding to Security Incidents
Outcomes addressed in this activity:
Unit Outcome:
Describe malware, viruses, and worms.
Course Outcome:
IT262-4: Produce wireless attacks and malware.
Purpose
What is the best response if an organization has been successfully attacked? Have a plan in place and ready to go is the best way to prepare for this eventuality. This plan needs to be stored in a secure off-site location in case a disaster makes the site inaccessible. This lab will provide you with insights into planning for security incidents.
Lab Instructions
This lab provides the hands-on element to your studies. It allows you to gain practical experience using the tools and techniques associated with ethical hacking.
Access the lab link entitled “Investigating and Responding to Security Incidents” in this lab section.
The following resources will help you get oriented in the lab environment: the Common Lab Tasks Manual and J and B Lab Tips. The manual will provide detail and the tips are a very abbreviated reference.
Open a new Microsoft Word document and put your name and assignment number at the top.
In the lab environment, you will find instructions for the specific lab, which can be downloaded. Follow the instructions.
Complete the instructions in Step 1. Compile your lab report in the document with a title page and an easy to understand explanation of what you are doing and why you are doing it. Within your document, after your lab report, answer the question in Step 2.
Conduct research and cite supporting sources in APA format where appropriate.
Complete the following:
Step 1:
Open the lab entitled “Investigating and Responding to Security Incidents.”
Click the “Start Lab” tab in the middle of the webpage.
Review the following material in the lab environment:
Before you Begin
Introduction
Section 1. Hands-On Demonstration
When you are ready to begin click: “Section 2: Applied Learning.”
Complete Parts 1, 2, and 3. Make sure to obtain the required screenshots that are noted in the online lab instructions.
Step 2:
Answer the following question in the lab document as part of the lab submission. Respond with a minimum of 250 words.
How exactly should you isolate an infected machine? What information might you lose if you powered the infected machine off?
The post IT 262 Walden Unit 8 Investigating and Responding to Security Incidents Lab Report first appeared on .