Expert answer:ISSC431 Central Texas Difference Between Black Box


Solved by verified expert:Hello,I need two responses of at least 150 words each for the below students discussions for this week. Also in the bold below are the questions the students at answering.For this assignment, answer the following:How do you remove a key logger?What is the difference between black box testing and white box testing? What can you do to prevent a port scan?Student one:How do you remove a key logger?A key logger is essentially a very nasty virus. All servers should have anti-virus and malware protections in place with specialized software or through intrusion detection or intrusion protect tools. Once the key logger is detected, it can be removed through the anti-virus software, or through other tools. Both Bitdefender and Malwarebytes (well respected security companies) provide specialized key logger removal tools. The key is prevention wherever possible, and detection and clean up if necessary. (Cooper, 2018)What is the difference between black box testing and white box testing? Black box testing is conducted by a tester who is blind to the system configuration. The tester does not know how the system is configured or what infrastructure is in place. This is generally done as an external test to simulate an attack from the outside by a malicious entity that has little to no knowledge of the system. White box testing is designed to simulate an internal threat who has experience or some information about the system and how it is configured. (Basta, Zgola, & Bullaboy, 2012) What can you do to prevent a port scan?It is difficult to prevent someone from running a port scan against a system from the outside. Port scanning tools can be blocked inside an Enterprise network, but there is little that an administrator can do about the people outside the network who might attempt to run a port scan against any publicly available hosts to see what ports are open. However, an administrator can take measures to ensure that the externally facing hosts provide as little information as possible. This can be accomplished by blocking or disabling ports that do not need to be active and using a firewall to block port scanning traffic and protocols. An administrator can also use third party tools to monitor the IP addresses that hit the ports on the servers, and how frequently those IP Addresses probe the servers. If an IP address probes a server very frequently on multiple ports, then that is an indicator that port scanning is occurring and the IP address can be blocked automatically. (Shaw, 2019)ReferencesBasta, A., Zgola, M., & Bullaboy, D. (2012). Database security. Boston, MA: Course Technology/Cengage Learning.Cooper, S. (2018, March 26). What is a keylogger and how can you avoid, detect and remove them. Retrieved June 26, 2019, from, C. (2019, February 6). Port Scanning: Detect Malicious Network & Port Scanner Requests. Retrieved June 26, 2019, from two:First, I would like to say I have enjoyed the past eight weeks in this course and the opportunity I had to learn from each person in this class. It always amazes me that we are already starting our final week in this course and hope to see each of you again in a future class.So what is a keylogger to begin with? A keylogger is malware that can detect and record an individual users keyboard and mouse inputs. This allows every key that has been typed and each click of the mouse to be recorded for view at a later date, compromising sensitive data such as passwords, pin numbers, and other personally identifiable information. If a keylogger is suspected using an onscreen keyboard will allow a user to type without giving up information as he/she did so.To remove a keylogger it first has to be detected by searching through the running processes. One the process is found using the task manger a user can click the end process button and terminate the process. This prevents the keylogger from recording any information until the computer restarts, as this does not uninstall the keylogger only disables it. Next run an anti-virus/anti-malware scan to see if it can detect and remove the keylogger. If it is unable to do so a user can manually remove the keylogger as it is normally located in the system files. However, it is imperative that the user knows for sure that the files/folders being deleted are the keylogger and not a true system file. One paid method that a user can use to remove a keylogger vulnerability is Anti-keylogger. If the anti-keylogger detects any potential keylogger it stops the program and requests the user to verify prior to deletion.Black box testing is when software is tested without knowing what the structure of the program code is. White box testing is the opposite, it is when the code and its structure is known to the tester.The easiest method to ensure a port scan is not productive or anyone is to set your firewall with all unneeded ports closed and a policy of no reply to any requests. If all requests are ignored and no reply is sent a threat actor will be unable to determine that a computer exists on the IP.ReferencesDifference between Black Box Testing and White Box Testing – Software Testing Class. (n.d.). Retrieved from to protect against port scans. (n.d.). Retrieved from SearchSecurity website: to Remove a Keylogger. (n.d.). Retrieved from

Don't use plagiarized sources. Get Your Custom Essay on
Expert answer:ISSC431 Central Texas Difference Between Black Box
Just from $10/Page
Order Essay
Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 30% with the discount code ESSAYSHELP