Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Assignment: System Hardening

Scenario

After the productive team meeting, Fullsoft's CTO engages in further analysis and establishes a plan to mitigate risks, threats, and vulnerabilities. As part of the mitigation plan, you and your team members will configure baseline security on all workstations. You will ensure that the antivirus software is running properly, remove unnecessary software and services, and implement a control related to password hacking attempts. You have been asked to train a new employee by demonstrating how to implement system hardening on a local workstation.

Tasks

Ensure that you are logged in as an administrator. Using a computer that has Windows 7* installed:

o Review the antivirus program and ensure it is up to date and running a full scan of the system.?

o Disable at least five unnecessary services from the default installation of Windows 7.?

o Configure audit logging to identify all failed password attempts into the system.?

* If possible, complete these tasks using a personal computer with the default installation of Windows 7. If you do not own the necessary hardware and software, consult with your Instructor about alternatives. After your work on this project is complete, you may need to return the settings to the previous configuration.?Then, for the employee you are training, write a summary of what you did and explain why system hardening is important. Include the following:

Summary?

o Explain how you ensured the antivirus program is updated and running a full scan of the system; describe anything significant you observed?

o Explain how you removed unnecessary services from the default installation of Windows 7, noting the five (or more) services by name and function?

o Explain how you configured audit logging to record all failed password attempts into the system. Rationale?

- Share an example of an IT security policy, standard, procedure, and guideline that relates to the system-hardening steps you have implemented?

o Explain the purposes of system hardening in terms of the company's overarching goal of maintaining information systems security.?

As a reminder,you may use the book for this course and the Internet to conduct research. You are encouraged to respond creatively, but you must cite credible sources to support your work.

Project Part 2 should be submitted in the following format and style:

o Format: Microsoft Word?

o Font: Arial, Size 12, Double-Space?

o Citation Style: Follow your school's preferred style guide?

o Length: 1-2 pages?

Self-Assessment Checklist?

· I have summarized the system-hardening steps I implemented on a computer using Windows 7, including:

o How I ensured the antivirus software is running properly?

o How I removed at least five unnecessary services, noting the services by name and

o function?

o How I configured audit logging of all failed password attempts

· I have provided an example to illustrate how system hardening relates to a company's IT security policy framework and explained the purposes of system hardening in terms of the company's overarching goal of maintaining information systems security?

I have conducted adequate independent research for this part of the project?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92789967

Have any Question?


Related Questions in Computer Engineering

Question suppose you are in the process of drawing the dfds

Question : Suppose you are in the process of drawing the DFDs, and you have found that one of your Level 1 DFD describing a process in level 0, has more than 8 sub-processes. What does that indicate? And How do you fix i ...

Start by assigning to variable answers a list containing an

Start by assigning to variable answers a list containing an arbitrary sequence of strings 'Y' and 'N'. For example: answers= ['Y','N','N','Y','N','Y','Y','Y','N','N','N'] Write Python statements corresponding to the foll ...

Question future policy and legislative issuesthe

Question: Future Policy and Legislative Issues The cyberspace domain continues to grow significantly in terms of its size, influence, and complexity. This complexity requires some form of meaningful policy formulation. D ...

The researchers stated that there were no significant

The researchers stated that there were no significant differences in the baseline characteristics of the intervention and control groups. Are these groups heterogeneous or homogeneous at the beginning of the study? Why i ...

A string in c is simply an array of characters with the

A string in C++ is simply an array of characters with the null character(\0) used to mark the end of the string. C++ provides a set of string handling function in as well as I/O functions in . With the addition of the ST ...

How does a database that is associated with a mobile device

How does a database that is associated with a mobile device and with mobile apps differ from a database that is stored and created using a more traditional application and server?

System analysis and designbarbara singleton manager of

system analysis and design. Barbara Singleton, manager of western regional sales at the WAMAP Company, requested that the IS department develop a sales force management and tracking system that would enable her to better ...

System analysis and designgo to the scr intranet pageto

SYSTEM ANALYSIS AND DESIGN Go to the SCR Intranet page! To enter, please use the following credentials: Then go to Session 5-Data and Process Modeling Look at the Inbox THE the todo-list and answer all the following 1. J ...

Question hypothetically speaking you are assigned to a

Question: Hypothetically speaking, you are assigned to a committee of three to decide on a dress code for Campbellsville University Staff and Faculty. Only two of the three votes are required to pass this policy. In this ...

1 why is it unlikely for magnesium to form a cation with a

1) Why is it unlikely for magnesium to form a cation with a charge of +1? 2) How can you tell whether disilicon hexabromide is considered an ionic or molecular compound according to its formula or name?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As