Chat with us, powered by LiveChat Part 2: After you complete the Lab, you will write a 2-page report to stakeholders about the importance of patching and securing systems. You will compose this report w - Essayabode

Part 2: After you complete the Lab, you will write a 2-page report to stakeholders about the importance of patching and securing systems. You will compose this report w

 PLEASE SEE ATTACHED ONLY NEED PART 2.

Part 2:

After you complete the Lab, you will write a 2-page report to stakeholders about the importance of patching and securing systems. You will compose this report within the same document as your Part 1 screenshots. Be sure to label your screenshots as Part 1 and your report as Part 2 in your Word document. Your report must include the security measures used from the Lab, clearly explaining why the security measures from the Lab are important to prevent breaches. Provide the stakeholders with real-world examples of the possible ramifications to an organization if the proper security measures are not taken.

Lab Details

Unit 2 Lab: Patching, Securing Systems, and Configuring Antivirus

Outcomes addressed in this activity:

Unit Outcomes:

· Determine secure software concepts.

· Modify a system by patching and securing it.

· Modify a system by configuring antivirus software.

Course Outcome:

IT544-1: Determine vulnerabilities in both systems and application software configurations.

Purpose

As you read about security breaches in the news, you are bound to read about a situation where the breach occurred because software was not patched, or ports on software systems were left open, or antivirus solutions were not configured properly (to name a few reasons). In this Lab, you will secure and patch a Windows Server® operating system. The intent of the Lab is for you to determine vulnerabilities in software systems and to take the proper steps to make them more secure.

Part 1:

Complete the Lab called  Patching, Securing Systems, and Configuring Anti-Virus . In the Lab environment, you will find step-by-step instructions. As you work through the Lab, there will be capture-the-flag challenges. To provide proof you captured the flags, you will need to take screenshots of the flags you capture. After capturing all flags, there will be one last thing you will do, which is to take a screenshot of the threat you detected in the Lab from the antivirus scan.

Part 2:

After you complete the Lab, you will write a 2-page report to stakeholders about the importance of patching and securing systems. You will compose this report within the same document as your Part 1 screenshots. Be sure to label your screenshots as Part 1 and your report as Part 2 in your Word document. Your report must include the security measures used from the Lab, clearly explaining why the security measures from the Lab are important to prevent breaches. Provide the stakeholders with real-world examples of the possible ramifications to an organization if the proper security measures are not taken.

Lab Requirements

Place your work from Part 1 and Part 2 into a Microsoft® Word® document. For Part 2, the report should be at least 2 pages long. Support any assertions made with credible sources using APA style formatting.

For more information on APA style formatting, go to Academic Writer, formerly APA Style Central, under the Academic Tools area of this course.

Also review the university policy on plagiarism. If you have any questions, please contact your professor.

Plagiarism

Plagiarism is an act of academic dishonesty. It violates the University Honor Code, and the offense is subject to disciplinary action. You are expected to be the sole author of your work. Use of another person's work or ideas must be accompanied by specific citations and references. Whether the action is intentional or not, it still constitutes plagiarism.

For more information on University’s Plagiarism policy, refer to the current  University Catalog.

Directions for Submitting Your Lab

Name your Microsoft Word document according to this convention: IT544_Unit2_FirstNameInitialLastName. Submit your completed work to the Unit 2 Dropbox by the deadline.

Links for Labs>  Patching, Securing Systems, and Configuring Anti-Virus

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?