CYB 240 Module Two Lab Worksheet - Bruce Brennen.docx - CYB...

This preview shows page 1 - 4 out of 4 pages.

The preview shows page 3 - 4 out of 4 pages.
CYB 240 Module Two Lab WorksheetComplete this worksheet by replacing the bracketed phrases in the Response column with the relevant information.Lab: Attacking Webservers From the WANPromptResponseIn the lab section “Altering the Website,”Step 25, when you type “HackedWeb Server” include your name after the text “Web Server” and provide ascreenshot of Step 24.In the lab, you covered up the tracking of access to the log files by deletinglines within the Access.log file. What other types of controls could be put inplace to identify that these changes occurred? What other types of securitymeasures could be put in place to help secure the web server?Types of controls:According to CIS Control 4.1 sub-control states, “Before deploying any newasset, change all default passwords to have values consistent withadministrative level accounts.” Other ways of securing the web server isLayering the system with multiple forms of authentications.
End of preview. Want to read all 4 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags
Web page, World Wide Web, Web server, Module Two Lab Worksheet

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture