{"id":330,"date":"2026-03-16T18:38:08","date_gmt":"2026-03-16T18:38:08","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jaimeyoung\/?p=330"},"modified":"2026-03-16T19:15:36","modified_gmt":"2026-03-16T19:15:36","slug":"cyse-280-windows-system-management-and-security","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jaimeyoung\/2026\/03\/16\/cyse-280-windows-system-management-and-security\/","title":{"rendered":"CYSE 280 Windows System Management and Security"},"content":{"rendered":"\n<p>This assignment gave me insight into authentication protocols and the roles they play in network security, and a massive NSA data theft incident perpetrated by an organization known as the Shadow Brokers. <\/p>\n\n\n\n<p><strong>Characteristics of network operating systems, tools, and NSA data theft<\/strong><\/p>\n\n\n\n<ol start=\"1\">\n<li>What are the main characteristics of a network operating system?<\/li>\n<\/ol>\n\n\n\n<p>Network operating systems provide common file system and database sharing so people can share documents and work products collaboratively. They allow printer and application sharing so workers can use networked printers rather than having small printers scattered all over buildings. They also provide directory services, backup services, and access control.&nbsp;<\/p>\n\n\n\n<ul>\n<li>Compare DHCP with APIPA. What are the benefits of having both of these protocols available within a network?<\/li>\n<\/ul>\n\n\n\n<p>APIPA automatically assigns IP addresses to network hosts while DHCP needs a server to assign IP addresses to network devices. A benefit of having both protocols is that APIPA can step in when DHCP servers are down, while DHCP allows for centralized IP address management by IT personnel.<\/p>\n\n\n\n<ol start=\"3\">\n<li>What are the main differences between a PowerShell variable and a constant?<\/li>\n<\/ol>\n\n\n\n<p>&nbsp;Constants in PowerShell are like constants in math. Their value never changes. They also cannot be deleted. They are immutable. Variables are mutable and their values can change.&nbsp;<\/p>\n\n\n\n<ol start=\"4\">\n<li>Compare the System File Checker tool to the File Signature Verification tool (Sigverif). What are the benefits of having both of these tools available within PowerShell?<\/li>\n<\/ol>\n\n\n\n<p>The SFC tool is used to find and repair missing system files or ones that have become corrupted. Sigverif is used to authenticate file signatures. Having both tools creates more security and lets IT personnel automate certain tasks for efficiency. <\/p>\n\n\n\n<p>5.&nbsp; The Shadow Brokers are believed to be affiliated with which country, and what do we know about their origins and allegiances?<\/p>\n\n\n\n<p>&nbsp;The Shadow Brokers are believed to be affiliated with Russia, and there is a theory that a government contractor working for Booze Allen Hamilton named Harold Martin III is involved in the theft of the NSA\u2019s data. There is some speculation that they are allied with Russia due to politically motivated statements, but others believe that if Russia were involved, they would be unlikely to release such information publicly when it could be &nbsp;exploited for intelligence, etc.<\/p>\n\n\n\n<p>&nbsp;6.&nbsp; The Shadow Brokers declared their allegiance to which President of the United States, and what implications did this decision have?<\/p>\n\n\n\n<p>&nbsp;The Shadow Brokers released statements supporting Trump at one point, but after looking into it more deeply, they said they were losing faith in him. The implications of their (at one time) enthusiasm for Trump implies that they may have been working to sway the US election in his favor. There are also theories that this was merely a ploy to cause political unrest and controversy to divide the people of the US.<\/p>\n\n\n\n<p>&nbsp;7.&nbsp; Once the Shadow Brokers group stole NSA hacking tools, what did they attempt to do with stolen tools, and should we have questions about the&nbsp; security of government networks and the safety of confidential data?<\/p>\n\n\n\n<p>The Shadow Brokers attempted to sell the tools through an auction, but bids were reportedly under $1,000. After they failed to gain significant money, they posted them for public access. This particular series of incidents raises serious questions about security of government networks and data confidentiality. If hacker groups can get to some of the most closely guarded secrets our government has, they can do grave damage to our national security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This assignment gave me insight into authentication protocols and the roles they play in network security, and a massive NSA data theft incident perpetrated by an organization known as the Shadow Brokers. Characteristics of network operating systems, tools, and NSA data theft Network operating systems provide common file system and database sharing so people can&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jaimeyoung\/2026\/03\/16\/cyse-280-windows-system-management-and-security\/\">Read More<\/a><\/div>\n","protected":false},"author":27870,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jaimeyoung\/wp-json\/wp\/v2\/posts\/330"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jaimeyoung\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jaimeyoung\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaimeyoung\/wp-json\/wp\/v2\/users\/27870"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaimeyoung\/wp-json\/wp\/v2\/comments?post=330"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jaimeyoung\/wp-json\/wp\/v2\/posts\/330\/revisions"}],"predecessor-version":[{"id":351,"href":"https:\/\/sites.wp.odu.edu\/jaimeyoung\/wp-json\/wp\/v2\/posts\/330\/revisions\/351"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jaimeyoung\/wp-json\/wp\/v2\/media?parent=330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaimeyoung\/wp-json\/wp\/v2\/categories?post=330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaimeyoung\/wp-json\/wp\/v2\/tags?post=330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}