Describe all the potentially problematic security events

Assignment Help Other Subject
Reference no: EM132868887

System Hardening and Auditing

Scenario

  • Fullsoft's chief technology officer (CTO) established a plan to mitigate risks, threats, and vulnerabilities. As part of the mitigation plan, you and your team members will configure baseline security controls on all workstations (harden the systems), which run either Windows 7 or Windows 10. For this effort, you will ensure that the antivirus software is running properly and implement a control related to password-hacking attempts.In addition, Fullsoft's CTO has asked your team to pay special consideration to continuously monitoring, testing, and improving countermeasures. The CTO points out that within the first 24 hours of configuring baseline security, you may sometimes receive alerts that malware has been quarantined within an antivirus program or notice a failed logon attempt captured by the Windows audit log. In response, you make a note to check the security of the workstation for which you will configure baseline security.The CTO also requests a report on the work you performed, part of which will be incorporated into the company's IT security policy procedures. The report should also include the purposes of system hardening and auditing, and an additional area of concern or emerging trend related to information systems security that's relevant to Fullsoft.At the end of the report, include a brief statement that explains how your work on this project relates to the larger responsibility you have for supporting the company's success regarding IT security. Your statement will be considered a part of your upcoming performance review.

Question 1: Explain how you ensured the antivirus program is up to date, scheduled to run regular quick scans, and when the last full system scan was run. Describe anything significant you observed.

Question 2: Explain how you configured audit logging to record all failed password attempts into the system.

Question 3: Describe all the potentially problematic security events that occurred in the 24-hour period after checking the antivirus software and configuring audit logging.

Reference no: EM132868887

Questions Cloud

Research digital forensic conferences : You are an experienced employee of the DigiFirm Investigation Company. Identify a conference that is most suited to advancing your career.
Osha air contaminant standards : Discuss whether you think OSHA's air contaminant standards are important, and why.
Applied business ethics and social responsibility curriculum : You are embarking on an exciting, challenging, fast-paced, and applied business ethics and social responsibility curriculum this term
Hazard communication standard and lead standard : Compare and contrast the training requirements in the Hazard Communication Standard (HAZCOM) (1910.1200) and the Lead Standard (1910.1025)
Describe all the potentially problematic security events : Describe all the potentially problematic security events that occurred in the 24-hour period after checking the antivirus software and configuring audit logging
Determine sales revenue : The company uses the direct method on its statement of cash flows and reported that it collected $45,200 during 2016 from its customers. Determine sales revenue
Understanding yourself : Analyze three ways in which your personality attributes, gender, and communication style influence the way you prepare for and perform in negotiations.
Explain the purposes of system hardening and auditing : Explain the purposes of system hardening and auditing in terms of the company's goal of maintaining information systems security.
How it relates to business in that country : Then, you will, one by one, explain why you have included each item in the bag, and how it relates to business in that country.

Reviews

Write a Review

Other Subject Questions & Answers

  Limitations of osha''s voluntary self-audit policy

Briefly outline the purpose, scope, provisions and limitations of OSHA's Voluntary Self-Audit Policy. What are the risks to your company of this approach to achieving a safe work environment?

  Discuss about the post given below

Refer to the "Social and Cultural Diversity Paper Writing Instructions" for a detailed explanation of the requirements for the Social and Cultural Diversity Paper that you will be developing throughout the course. You should have been working on t..

  What does tony do in this situation

Tony knows he should report this but would have to admit to violating the company's information technology regulations by logging into Robert's computer. If he warns Robert to stop his betting, he would also have to reveal the source of his inform..

  Are analysts like stephen krasner correct in claiming

To what extent, and in which areas, has national autonomy declined? To what extent, and in which areas, has national autonomy expanded?

  Why might a writer feel compelled to write about literature

In your post, answer the following questions: Why might a writer feel compelled to write about literature? How does it benefit us personally and/or professional

  Research a gang intervention program and write a 2 page

research a gang intervention program and write a 2 page summary of the program stating the history mission goals and

  Discuss what are some ways marketers

The Product Life Cycle represents the stages products go through from beginning to end. What are some ways marketers

  Identify the variables that you plan to test

For this assignment, provide a description of the problem statement and research question or hypothesis for your project. Identify the variables that you plan.

  Create a presentation with prezi courtesy of matthew lucas

Here is info about how to create a presentation with Prezi, courtesy of Matthew Lucas. Create a section of the presentation (first five slides) in which you.

  How media constructs gender role provide a specific example

Define race, ethnicity , and gender. Discuss how media constructs gender role, provide a specific example. Does the media construct gender roles differently base upon race? If so, how

  Imagine that you are a member of an ethics committee

imagine that you are a member of an ethics committee listening to arguments for and against altering the way in which

  Write a brief background of your chosen nonprofit entity

Provide a brief background of your chosen nonprofit entity using evidence from their publications or any other published materials. Then evaluate the factors.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd