{"id":339,"date":"2025-03-02T22:21:24","date_gmt":"2025-03-02T22:21:24","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/?p=339"},"modified":"2025-03-02T22:21:27","modified_gmt":"2025-03-02T22:21:27","slug":"homework-7","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/2025\/03\/02\/homework-7\/","title":{"rendered":"Homework 7"},"content":{"rendered":"\n<p>1. What are the benefits of folder and file auditing?<\/p>\n\n\n\n<p>Folder and file auditing helps monitor and track access to files and folders, allowing administrators to detect unauthorized access, modifications, and deletions. It also provides valuable insights for security purposes, helping organizations comply with regulatory requirements. Additionally, it helps with troubleshooting and identifying user behavior patterns to ensure data integrity is maintained and security risks are reduced. <\/p>\n\n\n\n<p>2. What are the advantages and disadvantages of using Microsoft Encrypting File System to protect files and folders?<\/p>\n\n\n\n<p>The advantage of using the Microsoft Encrypting File System is that it provides security<br>for your files so it is less likely to get targeted by malicious activity. The disadvantage<br>when it comes to EFS it that is possible for your files to be compromised by<br>unauthorized access or it is possible to lose your password to unencrypt the files<\/p>\n\n\n\n<p><br>The advantage of using the Microsoft Encrypting File System is that it provides security for your files so it is less likely to get targeted by malicious activity. The disadvantagewhen it comes to EFS it that is possible for your files to be compromised by unauthorized access or it is possible to lose your password to unencrypt the files<\/p>\n\n\n\n<p>Listen to \u201cEpisode #111: ZeuS of the DarkNet Diaries podcast which can<br>be found at <a href=\"https:\/\/darknetdiaries.com\/episode\/111\/\">https:\/\/darknetdiaries.com\/episode\/111\/<\/a><br><br>Based on the podcast, answer the following questions.<\/p>\n\n\n\n<p>3. What is ZeuS and how does it work?<br>Zeus is a banking malware that stole sensitive information and it stole money from the<br>victim\u2019s bank account. Zeus also completely takes over the computer and it joins a bot<br>which is a network of other infected machines. Zeus also can record people\u2019s<br>keystrokes, monitor network traffic, and it can also steal certificates<\/p>\n\n\n\n<p><br>4. How did law enforcement agencies and security researchers attempt to<br>take down ZeuS?<\/p>\n\n\n\n<p><br>They tried to take down Zeus by reporting it to certain places so it could get sinkholed<br>but it didn\u2019t stop Zeus. Another group of security researchers attempted to stop Zeus<br>they managed to sinkhole the domains but the botnets continued working. The FBI and<br>foreign law also took technical measures to take down Zeus and they coordinated<br>seizures of computer servers that was the backbone of game over Zeus.<\/p>\n\n\n\n<p><br>5.  What were some of the challenges in combating ZeuS?<\/p>\n\n\n\n<p><br>One of the challenges with combatting Zeus is that when the hackers were taking transfers out<br>of the bank accounts it wouldn\u2019t trace back them it would trace back to the infected computer.<br>Another challenge in combatting Zeus is that Slavik would update Zeus so the hackers were<br>able to have all the user\u2019s sensitive information to hack into their accounts and steal money.<br>Zeus was also really resilient to FBI and security researchers effort to combat Zeus because<br>even they sinkholed the malware the zeus still worked<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. What are the benefits of folder and file auditing? Folder and file auditing helps monitor and track access to files and folders, allowing administrators to detect unauthorized access, modifications, and deletions. It also provides valuable insights for security purposes, helping organizations comply with regulatory requirements. Additionally, it helps with troubleshooting and identifying user behavior &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/2025\/03\/02\/homework-7\/\">Continue reading<\/a><\/p>\n","protected":false},"author":25235,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[8],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/339"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/users\/25235"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/comments?post=339"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/339\/revisions"}],"predecessor-version":[{"id":340,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/339\/revisions\/340"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/media?parent=339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/categories?post=339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/tags?post=339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}