Student Solution

-->

"Education is the most powerful weapon which you can use to change the world”
– Nelson Mandela

1 University

1 Course

2 Subjects

Week 7 Writing Assignment

Week 7 Writing Assignment

Q A frantic system administrator informs you of several intrusion attempts from sources coming from the Internet. You are not certain the hackers have gained access to your network, but based on tools described in this chapter and techniques you have learned in this course, describe things you might look for to identify an attacker. Your written assignment should be 2 paragraphs in length with proper citations (APA) where appropriate. Rubric Written Assignment Rubric Written Assignment Rubric Criteria Ratings Pts This criterion is linked to a Learning OutcomeQuality 25 to >22.75 pts DISTINGUISHED Provides a well-thought out written assignment, reflective of a complete understanding of the topics and ideas. 22.75 to >20.5 pts PROFICIENT Provides thoughts and ideas gleaned from chapter reading and supplemental material. 20.5 to >18.25 pts SATISFACTORY Fragmented thoughts on topics and ideas presented in textbook. 18.25 to >16.0 pts EMERGING Provides minimal entry in journal entry. 16 to >0 pts UNSATISFACTORY Does not submit assignment. 25 pts This criterion is linked to a Learning OutcomeContent 25 to >22.75 pts Reveals adequate understanding of the topic as evidenced by well-organized written assignment. Uses examples to augment comprehension of the material. Reveals a solid understanding of the topic and ideas assigned. Thoughts are organized and expressed clearly. Uses examples and relates topic or ideas to real-world events. 22.75 to >20.5 pts Reveals adequate understanding of the topic as evidenced by well-organized written assignment. Uses examples to augment comprehension of the material. 20.5 to >18.25 pts Reveals a restricted understanding of the topic limited to information found in summary of textbook. 18.25 to >16.0 pts Writes little to express understanding of topic of writing assignment. 16 to >0 pts Does not add value to writing assignment. 25 pts This criterion is linked to a Learning OutcomeCritical Thinking 25 to >22.75 pts Offers critical analysis of topic. Organizes and conveys thoughts clearly. Answers all questions posed and provides relevant examples to illustrate understanding of the subject matter. 22.75 to >20.5 pts Offers critical analysis of topic. Organizes and conveys thoughts clearly. Answers most of the questions posed. 20.5 to >18.25 pts Drafts response to weekly writing assignment, but writing lacks thorough analysis of topic or ideas. 18.25 to >16.0 pts Provides no evidence of researching topic to formulate reply. 16 to >0 pts Does not post writing assignment. 25 pts This criterion is linked to a Learning OutcomeWriting Style 25 to >22.75 pts Highly skilled presentation of ideas. Engages reading. Work exceeds expectations for this level of student. Absolutely no errors in spelling, punctuation, or grammar noted. 22.75 to >20.5 pts Explicitly presents ideas. Work appropriate for this level of student. No spelling or grammar errors noted. A few minor punctuation errors identified. 20.5 to >18.25 pts Able to present ideas. Comes close to expectations for work at this level. Some punctuation and spelling errors but no errors in grammar identified. 18.25 to >16.0 pts Limited ability to convey ideas noted. Below expectations of work at this level. Errors noted in spelling, punctuation, and grammar. 16 to >0 pts Does not reply to written assignment. 25 pts Total Points: 100 PreviousNext

View Related Questions

Solution Preview

Access logs First, I would want to take a look at the access logs to see how many failed and successful attempts there have been. Analyzing access logs to me is a great start and perhaps if the attacker was stupid enough, I could trace their IP address but unlikely the result would be their true location. It's also important to note that most modern intrusion detection systems can also detect the kind of port scanners that attacker would utilize. Take a closer look at suspected user accounts For all users that are suspect, it would be important to take a deeper look at what they have been accessing and if falls within the norm for that user. I would also pay attention to users that have been able to escalate their privileges.