Nobody downloaded yet

Incident Response: Investigation of Crytolocker ( trace analysis with wireshark and windows 2003 server) - Coursework Example

Comments (0) Cite this document
Summary
The paper has been divided into several sections to enhance clarity. Cryptolocker is malicious computer software that is used in the compiling of the various Microsoft files such as…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
Incident Response: Investigation of Crytolocker ( trace analysis with wireshark and windows 2003 server)
Read TextPreview

Extract of sample "Incident Response: Investigation of Crytolocker ( trace analysis with wireshark and windows 2003 server)"

Download file to see previous pages These include PayPal scams, advertisements that are run in the internet and people deceived on wining fake lotteries, the fake inheritance scams as well as the EBay scams (Richard, 2013).
One factor that is worth noting is that they are developed so that the promiscuous persons can solicit some money from the people with the computers that have been affected by the virus. There are various computers that are at risk especially those that are operating certain programs in virtual reality. These include the apple and Linux computers. Another set of vulnerable computers are those that are using windows Vista, XP 2, Windows 7 and 8 while the other two computers mentioned earlier are affected by windows 8.1. It s a software that gets into a computer system and then bars the owner of the computer from accessing the services or the system until a ransom is paid (Kevin, 2012).
This software therefore does the encoding of data and therefore there is only access to the information by the authorized people. It is also used in websites. A good example of this kind of application is the case in the banking industry whereby there is the use of the hypertext transfer protocol (http). The image below shows data encryption process (Richard, 2013).
It is important to highlight that the virtual servers allow one box to execute several virtual images. Every operating system can manage its own without any system support from the prior installed operations system. This could be seen in the former eras whereby one windows server 2000 could support operation of windows 2003 besides others such as Linux, Each managing its applications. In setting up the virtual image, below are therefore considered as necessities that have to be there: (Kevin, 2012).
i. GSX server:-the licensing of this product for the case of a two processor machine begins from $3025. This is so because the product can withstand the number Central Processing Units (CPU) that can operate ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Incident Response: Investigation of Crytolocker ( trace analysis with Coursework - 1”, n.d.)
Retrieved from https://studentshare.org/information-technology/1686710-incident-response-investigation-of-crytolocker-trace-analysis-with-wireshark-and-windows-2003-server
(Incident Response: Investigation of Crytolocker ( Trace Analysis With Coursework - 1)
https://studentshare.org/information-technology/1686710-incident-response-investigation-of-crytolocker-trace-analysis-with-wireshark-and-windows-2003-server.
“Incident Response: Investigation of Crytolocker ( Trace Analysis With Coursework - 1”, n.d. https://studentshare.org/information-technology/1686710-incident-response-investigation-of-crytolocker-trace-analysis-with-wireshark-and-windows-2003-server.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Incident Response: Investigation of Crytolocker ( trace analysis with wireshark and windows 2003 server)

Windows HPC Server 2008

...., 2008). HOW IT WORKS This section presents an overview of the working and functioning method of Windows HPC Server. This section will discuss that how Windows HPC Server works? Basically, Windows HPC Server is designed on a group of servers that comprises a single head node and one or more compute nodes as stated in the below given Figure 1. In this scenario, the main head node that currently offers switching from fail component to backup component using Windows Server 2008 Enterprise accessibility services, SQL Server powers and clustering is...
7 Pages(1750 words)Research Paper

Windows Server 2012 Proposal

...? Windows Server Proposal Windows Server Proposal Introduction Windows Server that is alsodubbed as “Windows Server 8” is the sixth publication of Windows Server. Windows server 2012 is also recognized to be the server version of Windows 8 and again takes place of Windows Server 2008 R2. The two varieties, a developer preview and a better version, were actually unconfined by the time of expansion. This particular software was generally obtainable to customers from...
7 Pages(1750 words)Research Proposal

Windows Server Deployment: New Features of Windows Server 2012

...reports on demand and lastly administer remote resources (Russel, Charlie and Crawford 78-112). File server benefits the following groups when it is put into place: Administrators in IT responsible for network storage resources and who want to professionally distribute these assets by making quotas, those who want to block given types of files from being stored in network storage resources and those who want to produce reports to enhance understanding on how server storage resources are being used the final people are User account executives interested in applying storage policies by making quotas plus file screening rules for shared storage resources and user...
7 Pages(1750 words)Assignment

Windows Home Server

...HP EX475 Media Smart Server with Windows Home Server HP EX475 Media Server The HP Media Server is run by Windows Home Server which is introduced by Microsoft as a software solution for storage, access, sharing, and protection of digital files and other applications. Hardware Specifications The HP Media Server is running the AMD Sempron 64-bit Processor with a speed of 1.8 GHz or more (if over-clocked). The 64-bit processor allows the computer to run 64-bit operating systems and programs in the future. It also allows the current 32-bit operating systems to run as fast as the other 32-bit processors. The...
2 Pages(500 words)Essay

Windows Server 2003

...Benefits for a Business to Upgrade to Windows Server 2003 When Microsoft Corporation proudly announces the release of Windows Server 2003 on April 24, 2003, there were mix opinions among experts in the industry. They believed that the advantage of the new server is overestimated or overvalued. Some analyst says Microsoft's Server 2003 is just a minor refinement of their old Windows 200 Server. They added that even with a large number of enhancements included in the package, the 2003 version is more likely an improvement...
7 Pages(1750 words)Essay

History of Windows Server

...RUNNING HEAD: HISTORY OF WINDOWS SERVER History of Windows Server By Microsoft Corporation, one of the leading companies involved in software, services and internet technologies, introduced various server operating systems in various stages of the Personal Computer development. The Windows Server had many upgrades and releases through the years and is often used in reference to the body of server operating systems released by the Microsoft that primarily includes Windows 2003 Server and Windows 2008 Server and their...
6 Pages(1500 words)Essay

Comparing the Windows 2003 Server and Windows 2008 Server Operating System

...Better Technologies Nearing obsolesce Advance and New The comparison above indicates how fast the new technologies are developing. There are five main reasons for upgrading from Windows 2003 to 2008 as extracted in Figure 5 (Microsoft Corporation):- Consequences on Existing Installation Any decision of migration from Windows Server 2003 to 2008 requires critical planning of users account and their rights and data. Complete analysis of compatibility of hardware and software is also required by way of investigating whether each and every inventory item of hardware and software is operational and compatible with...
3 Pages(750 words)Essay

Windows server

...Windows Server 2008 Windows Server 2008 refers to a Server released by Microsoft as an up to the Windows Vista Server. The release of this server came with additional features such as improved security and more use friendly applications. This document serves to showcase the advantages and disadvantages of the system. It also shows the procedure to be undertaken when migrating from a previous server to Windows Server 2008. To start off, a SWOT analysis of the server shows a four sided viewpoint of the...
8 Pages(2000 words)Research Paper

Windows server 2008R

..., each virtual machine must be provided with sufficient processor resources, memory resources and disk resources for its server 2008 instance. Within a Hyper-V role on Windows Server 2008 a maximum of four virtual processors can be allocated to virtual machines running windows server 2008 32-bit or 64-bit editions. A maximum of 2 virtual processors can be allocated to virtual computers that are running windows server 2003 32-bit edition. For virtual computers hat host other operating systems, a maximum of one virtual processor can be allocated to virtual computers. Microsoft Windows...
8 Pages(2000 words)Assignment

Windows Server Deployment Proposal

...Windows Server Deployment Proposal: The Case of Worldwide Inc The Case of Worldwide Inc Storage of information is one of the most crucial aspects of any organisation since it essentially forms its core. In this regard, the setting up of an effective server network can play a significant role in determining the extent to which the firm will either be successful or fail. This essay will therefore examine infrastructure server aspects including DHCP and DNS which drive the servers to the application servers which will enable the firm to bring to reality its advertising needs. The essay has set out an active directory schema that will not require much management. In addition, it also proposes a File and Sharing system that is suitable... for a...
6 Pages(1500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Incident Response: Investigation of Crytolocker ( trace analysis with wireshark and windows 2003 server) for FREE!

Contact Us