...could allow remote code execution. This vulnerability has been investigated my Microsoft and a link to the appropriate update has been issued on the Advisory page. 2. Advisory 2755801: Vulnerabilities in Adobe Flash Player in IE 10. The software affected by this vulnerability are both 32/64-bit Windows 8 systems, and also Windows Server 2012. An update has been published that fixes this by updating the Adobe Flash libraries in IE 10 that are affected. It is also possible to temporarily remedy this by changing up the registry files with the text provided on the Advisory page. The Administrator may also disable Flash Player from running on IE 10 via group policy on Windows 8 and Server 2012. 3. Advisory 2736233: Microsoft has released new kill bits for ActiveX after multiple requests by Cisco concerning vulnerabilities in some of its services; Cisco Secure Desktop, Cisco Hostscan, and Cisco AnyConnect Secure Mobility Client are all services that are affected by an ActiveX vulnerability. This affects most Windows XP/7 systems, along with Server 2003/2008 software. 4. Advisory 2661254: Update for Minimum Certificate Key Length. RSA keys being used in certificates that are less than 1024 bits in length are vulnerable to attackers duplicating the certificates, phishing, and man in the middle attacks. Examples of the services that are affected are encrypted emails and private PKI environments. It is suggested that this update is tested out first before being pushed out throughout...
Words: 390 - Pages: 2
...Unit 2 Assignment 2 Microsoft Environment Analysis ITT Technical Institute Instructor: Date 1. What vulnerabilities exist for this workgroup LAN based on the advisories?Publication Date | Advisory # | Title | December 29, 2015 (Originally published September 21, 2012) | 2755801 | Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge | December 8, 2015 | 3123040 | Inadvertently Disclosed Digital Certificate Could Allow Spoofing | December 8, 2015 (Originally published July 14, 2015) | 3057154 | Update to Harden Use of DES Encryption | November 30, 2015 | 3119884 | Improperly Issued Digital Certificates Could Allow Spoofing | November 10, 2015 | 3108638 | Update for Windows Hyper-V to Address CPU Weakness | October 13, 2015 (Originally published September 24, 2015) | 3097966 | Inadvertently Disclosed Digital Certificates Could Allow Spoofing | October 13, 2015 (Originally published May 12, 2015) | 3042058 | Update to Default Cipher Suite Priority Order | October 13, 2015 (Originally published May 13, 2014) | 2960358 | Update for Disabling RC4 in .NET TLS | September 8, 2015 | 3083992 | Update to Improve AppLocker Publisher Rule Enforcement | July 14, 2015 | 3074162 | Vulnerability in Microsoft Malicious Software Removal Tool Could Allow Elevation of Privilege | June 9, 2015 (Originally published May 5, 2014) | 2962393 | Update for Vulnerability in Juniper Networks Windows In-Box Junos Pulse...
Words: 818 - Pages: 4
...Elvie Bramich Unit2 Assignment 2 : Microsoft Environment Analysis 1. WHAT VULNERABILITIES EXIST FOR THIS WORKGROUP LAN BASED ON ADVISORIES?LIST FIVE OF THEM. Answer: 2755801, 2719662, 2854544, 2846338, 2847140. 2. DO ANY VULNERABILITIES INVOLVE PRIVILEDGE ELEVATION?IS THIS CONSIDERED A HIGH-PRIORITY ISSUE? Answer: 2846338 involves privilege elevation, Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority. 3. IDENTIFY AND DOCUMENT AT LEAST 3 VULNERABILITIES AND THE SOLUTIONS RELATED TO THE CLIENT CONFIGURATIONS. Answer: Three vulnerabilities and Solutions related to client configurations. Advisory Number: 2719662 Microsoft is announcing the availability of an automated Microsoft Fix it solution that disables Windows Sidebar and Gadgets on supported editions of Windows Vista and Windows 7. Disabling Windows Sidebar and Gadgets can help protect customers from potential attacks that leverage Gadgets to execute arbitrary code. Customers should consider the following ways that an attacker could leverage Gadgets to execute arbitrary code: Microsoft is aware that some legitimate Gadgets running in Windows Sidebar could contain vulnerabilities. An attacker who successfully exploited a Gadget vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker...
Words: 468 - Pages: 2
...Explorer could allow remote code execution. This vulnerability has been investigated my Microsoft and a link to the appropriate update has been issued on the Advisory page. 2. Advisory 2755801: Vulnerabilities in Adobe Flash Player in IE 10. The software affected by this vulnerability are both 32/64-bit Windows 8 systems, and also Windows Server 2012. An update has been published that fixes this by updating the Adobe Flash libraries in IE 10 that are affected. It is also possible to temporarily remedy this by changing up the registry files with the text provided on the Advisory page. The Administrator may also disable Flash Player from running on IE 10 via group policy on Windows 8 and Server 2012. 3. Advisory 2736233: Microsoft has released new kill bits for ActiveX after multiple requests by Cisco concerning vulnerabilities in some of its services; Cisco Secure Desktop, Cisco Host scan, and Cisco Any Connect Secure Mobility Client are all services that are affected by ActiveX vulnerability. This affects most Windows XP/7 systems, along with Server 2003/2008 software. 4. Advisory 2661254: Update for Minimum Key Certificate Length. RSA keys being used in certificates that are less than 1024 bits in length are vulnerable to attackers duplicating the certificates, phishing, and man in the middle attacks. Examples of the services that are affected are encrypted emails and private PKI environments. It is suggested that this update is tested out first before being pushed out throughout...
Words: 377 - Pages: 2
...multi-dimensional cube or hyper cube. For example, a user can request that data be analyzed to display a spread-sheet showing all of a company's products sold in Ghana in the month of January, compare revenue figures with those for the same products in March, and then see a comparison of other product sales in Ghana in the same time period. Historical Background The first fully functional on-line analytical system was introduced in 1970 by Express, and later in 1995, the Oracle acquired the release for the resource of information. The formal launching for acquisition of OLAP was held in 2007. Oracle also released its own system called Essbase using the OLAP theoretical background and functionality. In 1998, Microsoft stepped in for upgrading and advancement in the OLAP technology. Microsoft worked on the mainstream idea and developed highly advanced online analytical system that is deployed in many large organizations today. Types of OLAP There are 3 types of the on-line analytical systems each with different properties according to the level of use. Multi-dimensional OLAP Multi-dimensional OLAP is also known as MOLAP in short. It is a classic type of leading on-line analytical systems. Instead of storing the data in relational form, it has the ability to store data in the multi-dimensional array that is highly optimized. This makes the data storage more efficient and quick. . Relational OLAP Relational OLAP (ROLAP) works similar to the relational...
Words: 824 - Pages: 4
...A SWOT Analysis view of the software development industry Georgios Kormaris Department of Information and Computing Sciences, Utrecht University, Utrecht, The Netherlands gkormari@cs.uu.nl WWW home page: http://www.cs.uu.nl/ Introduction I n the past twenty to thirty years many changes and developments have taken place in the software industry which started off during the 1960s mainly in the United States of America and experienced a revolutionary boom since the 1980s, Steinmueller, (1995). There are many different ways and methods of developing software and planning the strategy of a software development company, as we can derive from many recent research projects. Most of these projects are usually concerned with the way that software is developed and not with the way that the strategy of the company as a whole is planned, Cusumano, MacCormack, Kemerer, & Crandall, (2003). Another important factor is which techniques and methods are used to analyze company’s environment and how the strategy is formulated and implemented. In this paper we analyze a popular method for strategic planning which has been mostly used for product portfolio planning and strategic planning on an abstract level, as stated in a research paper by Houben, Lenie, & Vanhoof, (1999). We will focus our interest in the software industry and base our research on the case study of the Austrian software industry as it is presented by Bernroider, (2002). Additionally, certain guidelines are...
Words: 4799 - Pages: 20
...Oil and Natural Gas Corporation Limited Introduction A modest entity in the serene Himalayan settings - Oil and Natural Gas Corporation Limited (ONGC) was set up as a Commission on August 14, 1956. The company became a corporate on June 23, 1993, which has now grown into a full-fledged horizontally integrated petroleum company. Today, ONGC is a flagship public sector enterprise and India’s highest profit making corporate, achieving the record of being the first Indian corporate to register a five digit profit figure of Rs. 10,529 Crore in the year 2002-03. The Indian government holds 74.14% equity stake in this company. ONGC has produced more than 600 million metric tonnes of crude oil and supplied more than 200 billion cubic metres of gas since its inception, thus fuelling the increasing energy requirements of the Indian economy. Today, ONGC is the most valuable company in India, contributing 77 percent of India’s crude oil production and 81 per cent of India’s natural gas production. ONGC is one of Asia's largest and most active companies involved in exploration and production of oil. It is involved in exploring for and exploiting hydrocarbons in 26 sedimentary basins of India. It produces about 30% of India's crude oil requirement. It owns and operates more than 11,000 kilometres of pipelines in India. ONGC has made six new discoveries, at Vasai West (oil and gas) in Western Offshore, GS-49 (gas) and GS-KW (oil and gas) in Krishna-Godavari Offshore, Chinnewala...
Words: 2934 - Pages: 12
...Kettering University Department of Business MGMT 659 - Strategy Summer 2013 Prof. Irish BUS Project – Microsoft Rakan Mogaddam Contents 1 Current Situation Analysis 3 1.1 Past Performance Indexes 3 1.1.1 Ratios 3 1.1.2 Industry Competitor Comparison 4 1.2 Strategic Posture 4 1.2.1 Mission Statement 5 1.2.2 Vision Statement 5 1.2.3 Strategies and Policies 5 2 Corporate Governance 6 2.1 Board of Directors 6 2.2 Top Management 7 2.3 Stakeholders 8 3 External Environment 9 4 Internal Environment 10 5 Analysis of Strategic Factors 14 6 Alternatives & Recommendations 15 7 Implementation and Control 17 8 Evaluation Scorecard (Kaplan) 18 References: 20 Current Situation Analysis 1 Past Performance Indexes 1 Ratios The ratios of Microsoft can be used to analyze how well the company is performing according to its investments and recent profits. The following are a few ratios for the year ended June 30, 2013: 1 Credit Ratios 1. Current Ratio: 271% This ratio tells us the relation between the current assets and liabilities of the company. 2. Quick Ratio 266% This ratio tells us how liquid our assets are. This means how quickly we can change our assets into cash. 2 Profitability Ratios 1. Return on Assets 12.69% It tells about...
Words: 2833 - Pages: 12
...Department of Defense (DOD) has several departments within the agency that companies will need to work with in order to carry out the terms of their contracts. When considering technology specifically, the DOD has the following departments ready to assist companies: Information Assurance Support Environment, Defense Information Systems Agency, Defense Technology Security Administration, Defense Cyber Crime Center, Defense Technical Information Center, and possibly others that were not immediately obvious (U.S. Department of Defense, 2015). The Information Assurance Support Environment produces Security Technical Implementation Guides (STIGs) for various computer topics, which can be utilized by companies who wish to do business with the DOD. These guides serve as a baseline for the company in regards to the technology specifications they should have in place in order to lock down their systems and network to make them less vulnerable to malicious attacks (Defense Information Systems Agency, 2015). Among these STIGs is one written specifically for the Windows 8 / 8.1 operating system (Information Assurance Support Environment, 2015). This STIG outlines some of the changes made by Microsoft to Windows 8 / 8.1 as well as their recommendations for securing computers, which use that operating system. Tools Windows 8 / 8.1 comes with many tools built into it that allow for the administrator to use in order to do a security audit. A keyboard shortcut of pressing the Windows key plus...
Words: 855 - Pages: 4
...BUS 478-D200 Case Synopsis: Microsoft Prepared by Group E: Piero Bi Bella Xiao Wendy Shi Ruobing Gan Joanna Chen 301088927 301103166 301083155 301110709 301145515 Date: Nov. 19th, 2012 HISTORY Microsoft was founded by Bill Gates and Paul Allen in Albuquerque, New Mexico on April 4, 1975. Its success on developing the Microsoft Windows operating system and Office software packages has allowed the company to be the world’s largest computer technology corporation. On November 1, 1978, the company set up the first international office in Japan and on June 1981, the company became was incorporated in the state of Washington. Bill Gates became the president, and Paul Allen became the executive vice president. As of 2012, Microsoft has 94,420 employees worldwide and its net revenue is 74.30 Billion U.S. dollars. The company’s mission is to help their customers to realize their full potential. Through constantly updating and improving their products, Microsoft is able to maintain its leading position in the market (Microsoft Corporation, 2012). Microsoft has five business divisions: • Windows & Windows Live Division offers PC operating systems and PC hardware products; • Server and Tools Division produces the server version of Windows, Windows Azure, Intune, and Embedded, Microsoft SQL Server, Visual Studio, Silverlight, system center products, Microsoft consulting services, and Premier product support services, and cloud-based services; ...
Words: 1933 - Pages: 8
...readability. |Author | | |Author Position | | |Date | | Version: 1.0 ( 2002 Microsoft Corporation. All rights reserved. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. Microsoft and Visual Basic are either registered trademarks or trademarks of Microsoft in the United States and/or other countries. Revision & Sign-off Sheet Change Record...
Words: 2271 - Pages: 10
...marketing communication tools whilst measuring the environment (context) that they operate under while providing several suggestions of improving their communications to parties internally and externally. There this group is consisted of 3 members and the chosen industry and organization for this report is gaming consoles; Microsoft Xbox. While conducting our research on the context of the industry and Microsoft Xbox, several marketing tools were used to acquire this information. With the utilization of Asteroid Tabulation, we were able to acquire supporting information on consumers. This information would involve the use of the Roy Morgan surveying data base. By conducting marketing research through the use of Asteroid and Roy Morgan resources the group was able to determine and observe formalities, and purchase and consumer behaviour of the customers. Other areas of context of the gaming console industry were analysed, one of the areas included the way Microsoft Xbox has communicated to prospective customers and current customers. In terms of marketing perspective; we will discuss the ideologies and perspective Microsoft Xbox are communicating to their customers. A situation analysis is also conducted in terms of the environment Microsoft and other gaming console company’s face. As competitors also determine the behaviour of how a corporation will behave, therefore to determine decision making in response to competitors, A SWOT analysis is conducted to identify strengths, weaknesses...
Words: 3405 - Pages: 14
... 6 Key Issues .............................................................................................................. 8 Slow to Innovate ................................................................................................................................................. 8 PC Market in Decline ........................................................................................................................................ 8 Mobile Device’s Poor Performance ............................................................................................................ 9 The External Environment .................................................................................... 10 PESTEL Analysis ............................................................................................................................................... 10 Conclusions ......................................................................................................................................................... 14 Porters Five Forces...
Words: 8505 - Pages: 35
...Current Market Conditions Competitive Analysis ECO/365 Bill Gates and Paul Allen made a company called Microsoft in 1975. They were computer fanatics that had a idea for personal computers. Microsoft then established itself into a household name. The marketplace for the personal computer became a actuality with the dream and hard work of Microsoft. Our group has been selected to be a part of a strategic planning team at Microsoft. They are the worldwide front-runner in software, services and solutions that support individuals and companies to realize their full potential ("A History of Windows", 2014). Microsoft is thinking about developing a new TV line. The marketing director directed our team to do a competitive market analysis and figure out the TV’s possible success. Our analysis will include an emphasis on Microsoft’s primary challenger (Sony) in the TV market. This report will look at the company as it relates to the current market settings and as it pertains to Microsoft concerning the marketplace structure, knowledge, price elasticity of demand, and participants. Tec-view vs. Sony HD Television Microsoft has developed a new television that will be an all in one component called Tec-view. This product will take the place of your computer and various digital devices while maintaining the expected functions of a television. Microsoft has brought superior upgrading to the line of visual experience. The competitor Sony HD television, is also working...
Words: 1384 - Pages: 6
...Microsoft and the Xbox 360 Ring of Death ------------------------------------------------- Table of Contents Executive Summary ...................................................................................................................... 3 Problem Statement .......................................................................................................................4 Situation Analysis ..........................................................................................................................4 Objectives ..............................................................................................4 Background ............................................................................................5 SWOT Analysis ..............................................................................................................................6 Strengths ...............................................................................................6 Weaknesses ...........................................................................................7 Opportunities .........................................................................................8 Threats................................................................................................... 8 Market Analysis ............................................................................................................................9 Previous Market...
Words: 7018 - Pages: 29