Reference no: EM133066644
Question 1. Benchmark - Host Hardening
Protecting the host through the process of hardening is a key skill.
1. Develop a plan for hardening your VM to minimize systems risks, threats, and vulnerabilities using best practices of secure programming. Make sure to identify specific design principles that could be violated and the appropriate defensive or countermeasures/steps to be taken.
2. Then, describe the basic secure design fundamentals that will create a trusted computing platform.
3. Include at least seven host hardening techniques as discussed in Chapter 7 of the textbook, as well as identify the type of control that you are implementing. (here use any
4. Implement the plan on your VM.
5. As you go, take instructional notes and screenshots that will help to reproduce your process using the "Report Template," located in the Class Resources.
Question 2. Client Side Attacks
1. Install a popular anti-malware package on your virtual machine (VM).
2. Perform a full anti-malware scan of your VM.
3. Disable the firewall.
4. Disable your anti-malware software.
5. Leave the virtual machine connected to the internet for 24 hours or more. You could also visit some sketchy websites such as "Add More RAM" ; or you could visit a malware repository and infect your VM.
6. Perform a second full anti-malware scan. Document the differences.
7. As you go, take instructional notes and screenshots that will help to reproduce your process using the "Report Template," located in the Class Resources.
8. Sub-Activity: If your scans do not detect any vulnerabilities or malware on the VM, review your chosen anti-malware website for known/current vulnerabilities and document them.