StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Microsoft Systems - Assignment Example

Cite this document
Summary
In contrast to worm or virus, which spreads by itself, Trojan has disguise the user to make it run. It is mostly done through social engineering, i.e. they look innocent and attractive to make the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Microsoft Systems
Read Text Preview

Extract of sample "Microsoft Systems"

Forms of Attack on Microsoft Forms of Attack on Microsoft There are many threats, which poses security danger for Microsoft. A brief description of notable worms is provided in this paper. Trojan horse: Trojan horse is a malicious program that befools the user to run it. In contrast to worm or virus, which spreads by itself, Trojan has disguise the user to make it run. It is mostly done through social engineering, i.e. they look innocent and attractive to make the user download and install by the user.

After its successful installation it can reach and contrive personal data, can download other malware or can give a hacker access to user’s PC (Ghorbani, Lu, & Tavallaee, 2009).Backdoor: It a software that gives malicious hacker access to user’s PC. It enables the hackers to take control of the system, and monitor them. A kind of backdoor Trojan is bot.Denial of services: some malicious software blocks access to particular resources. In such case, attacker floods the network with more traffic that it cannot handle thus resulting in a temporary system crash.

Email Hacking: It is the prominent service used for professional as well as personal functions. Through the Internet, e-mail one can correspond to millions of people worldwide and spread threat widely which includes eavesdropping and intrusion attacks.Social engineering: It is a form of attack by tricking people to reveal their security passwords and other information. Robot/intermediary process: Sometimes malicious programs execute instructions that run on one computer and then trigger attacks on target computers.

Unprotected window share: Attacker uses such vulnerabilities to install tools and malicious software on the target computer. Unprotected window share renders the system highly vulnerable to the attackers.Cross-site scripting: These are specific malicious code, which attacks web-based applications.Packet sniffing: It is also a form of attack in which the attacker gathers all the network messages in a network to reach sensitive information like, such as passwords (Microsoft Securities, 2015).ReferencesGhorbani, A. A., Lu, W.

, & Tavallaee, M. (2009). Network Intrusion Detection and Prevention: Concepts and Techniques: Volume 47 of Advances in Information Security. New York: Springer Science & Business Media.Microsoft Securities. (2015, March 3). Microsoft Securities. Retrieved from http://www.microsoft.com/security/portal/mmpc/shared/glossary.aspx

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Microsoft Systems Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Microsoft Systems Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1681685-microsoft-systems
(Microsoft Systems Assignment Example | Topics and Well Written Essays - 250 Words)
Microsoft Systems Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1681685-microsoft-systems.
“Microsoft Systems Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1681685-microsoft-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Microsoft Systems

Evaluation of Open Source Operating System

This paper “Evaluation of Open Source Operating System” describes some of the issues in the evaluation of the open source operating systems.... There are reasons for the increased interest in the open source operating systems like the success of products like Linux and Apache.... hellip; The author states that the open source systems were found during the 1980s with the development of a free version of 'Unix' by Richard Freeman.... The open source system becomes interesting to user groups such as the individual users who use the open source systems in industrial and academic areas mostly in the non-software areas....
5 Pages (1250 words) Assignment

Microsoft Windows operating system

Microsoft Windows is a family of operating systems by Microsoft for use basically on personal computers, but it has been successfully proved since the first version of Windows that they can run on several types of platforms such as servers and embedded devices.... Business economics tell us that a perfectly competitive market has the following characteristics: Microsoft Windows Operating System Microsoft Windows is a family of operating systems by Microsoft for use basically on personal computers, but it has been successfully proved since the first version of Windows that they can run on several types of platforms such as servers and embedded devices....
2 Pages (500 words) Essay

Network Management and Security in the Office

After MS Blast and the cost of patching that, it's, 'Here we go again,' as new vulnerabilities are found deeply ingrained in Microsoft Systems.... There is a continued weight the cost of continually patching microsoft products when deciding which operating system to purchase....
7 Pages (1750 words) Essay

Solution and explain

Any department of an organization which runs BSD servers can provide data to any standalone environment systems, whether it may runs with MAC OS or Microsoft Systems.... OpenBSD is the perfect operating system for server systems.... "DEC Alpha systems, Intel i386 systems, Hewlett-Packard PA-RISC, AMD AMD64 and Motorola 68000 processors, Apple's PowerPC machines, Sun SPARC and SPARC64-based computers, the VAX and the Sharp Zaurus....
2 Pages (500 words) Essay

Earliest Microsoft Operating Systems

The paper "Earliest Microsoft Operating systems" discusses that the Windows Server 2008 will be built to ship only 64-bit.... The latest major release from microsoft after Windows Vista is Windows 7, which was given a three year time period for development.... hellip; On the 30th of November 2006, microsoft released Windows Vista to the business customers and the consumer versions on 30th of January 2007.... Rowland Hanson, marketing head of microsoft suggested that Windows would be a very appealing name to the customer when compared to “Interface Manager”, which was supposed to be its name....
7 Pages (1750 words) Coursework

Organization Development and Future Scenarios

It is due to the evident fact that organizations are growing at a steady pace, promulgating success reports of achieving corporate goals.... In 2007 a study was carried out in order to ascertain future of managing people and… Main challenge that is predicted in the PwC report is the vision of workplace in future....
7 Pages (1750 words) Essay

New Features of Windows Server

Using Windows Deployment Service in a master workstation, all operating systems and servers will be automatically installed from images.... Windows Server 2012 R2 has an internal database (Windows Internal Database) which can be used by IPAM .... n addition to this; Windows Internal Database allows specification of external SQL Server instances which increases database availability, scalability and reporting. Windows… This is good for Worldwide Advertising Inc....
4 Pages (1000 words) Term Paper

Windows Server Deployment - Worldwide Inc

From the paper "Windows Server Deployment - Worldwide Inc" it is clear that the File services used by Worldwide Advertising make use of the recommendations put forward by microsoft.... Considering the fact that when making the decision to design and select the system specifications for a new solution of a server, it is important to consider that even the most optimal requirements for the system from microsoft might not be requisite....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us