Computers comply with standard security baseline

Assignment Help Basic Computer Science
Reference no: EM132525548

Scenario

Always Fresh wants to ensure its computers comply with a standard security baseline and are regularly scanned for vulnerabilities. You choose to use the Microsoft Security Compliance Toolkit to assess the basic security for all of your Windows computers, and use OpenVAS to perform vulnerability scans.

Tasks

Develop a procedure guide to ensure that a computer adheres to a standard security baseline and has no known vulnerabilities.

For each application, fill in details for the following general steps:

1. Acquire and install the application.

2. Scan computers.

3. Review scan results.

4. Identify issues you need to address.

5. Document the steps to address each issue.

Reference no: EM132525548

Questions Cloud

Describe with examples-symmetric encryption : Describe with examples, symmetric encryption. Describe with examples asymmetric encryption.
Develop new information security policy : If you were asked by your employer to develop a new Information Security Policy, where would you turn to find resources to build this policy?
Business challenges within seven domain of it responsibility : Why is understanding hacking, exploitation, vulnerabilities, and attacks critically important? What motivates hackers to attack computer networks?
Identify current digital threat : Identify a current digital threat against at least one national critical infrastructure sector and research it.
Computers comply with standard security baseline : Always Fresh wants to ensure its computers comply with a standard security baseline and are regularly scanned for vulnerabilities.
Discussion on information security policy : If you were asked by your employer to develop a new Information Security Policy, where would you turn to find resources to build this policy?
Articles collectively advocate for proactive research : How do the articles collectively advocate for proactive research, evaluation, and implementation of new technologies and ideas?
Public policy can make significant impact on economy : Public policy can make a significant impact on the economy. describing how the public policy can impact Information Technology from a business standpoint
Explain change management practices : Explain change management practices and the benefits of updating and implementing such practices.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Esign a four state finite automaton that accepts the words

Design a 4-state finite automaton that accepts the words over {a,b} that end with aba.

  Discuss the technological and financial risks the company

Discuss the technological and financial risks the company in the scenario faces and what they could do to mitigate those risks.

  Calculate the signal-to-noise ratio at the detector output

Calculate the signal-to-noise ratio at the detector output, assuming the detector is completely insensitive to amplitude variations.

  Design the logic for an application for a company

Modify Exercise 7a so that the report lists department names as well as numbers. The department names are shown in the accompanying table.

  Algorithms and data structures

Algorithms and Data Structures Chapter: LINEAR PROBING VS SEPARATE CHAINING (HASHES) Question: Which one is better:

  How long will these 10000 request take

How long will these 10000 request take (total) assuming the disk services requests in FIFO order?

  Interface between hardware and applications

interface between hardware and applications

  What have you learned that is new about the technology

What have you learned that is new about the technology, where do you see it going over the next few years

  Milestone one-pseudocode submission

Does anyone have pseudocode for 5-2 Milestone One: Pseudocode Submission

  What should be the first three bits of this address

If you are assigned an IPv6 address by your ISP for your personal computer at home, what should be the first (leftmost) three bits of this address?

  Research on failover clustering for hyper

Do some research on failover clustering for Hyper-V. Create a table showing how clustering can help with both storage and network failure.

  Compute the internet checksum for data

Suppose the information portion of a packet (D in Figure 5.3) contains 10 bytes consisting of the 8-bit unsigned binary ASCII representation of string

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd