Describes hardening technique

Assignment Help Basic Computer Science
Reference no: EM132686289

Scenario

As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.

The following are issues to be addressed through hardening techniques:

Previous attempts to protect user accounts have resulted in users writing long passwords down and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess, such as words founds in the dictionary.

Every user, regardless of role, must have at least one unique user account. A user who operates in multiple roles may have multiple unique user accounts. Users should use the account for its intended role only.

Anonymous users of the web server applications should only be able to access servers located in the demilitarized zone (DMZ). No anonymous web application users should be able to access any protected resources in the Always Fresh IT infrastructure.

To protect servers from attack, each server should authenticate connections based on the source computer and user.

Tasks

Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.

 

Reference no: EM132686289

Questions Cloud

Technology impact on todays work environments : What are some of the best benefits and please be detailed as to what makes them the most beneficial
What risks are associated with wireless communication : What risks and safeguards are associated with wireless communication? Are you comfortable (or would you use) a wireless "hot spot" to do computer work?
How the company could have done a better job : If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your.
How is the role of an effective follower similar : What skills and abilities does a manager need to lead effectively in a virtual environment
Describes hardening technique : Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.
What can be certain problems when doing a proposal : What kind of funding sources can be contacted for a grant proposal?
Operations of some of malicious software : What are some of the characteristics and operations of some of the malicious software that exists today?
Case study 9-1 it governance at toyota : On January 1, 2019, Toyota Systems Co., Ltd was formed with a merger of three IT subsidiaries that had been developing digital and communication technologies
Improper file or directory permissions : Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is a piecewise function

What is a piecewise function? Create a numerical example and explain how your example could represent a realistic situation.

  Privacy and security go hand in hand and hence

According to authors, privacy and security go hand in hand and hence, privacy cannot be protected without implementing proper security controls and technologies

  Why asexually reproducing organisms

Explain why asexually reproducing organisms are generally found in environments that do not change very much through time, while sexually reproducing organisms.

  What are the major problems

What are the major problems (or side-effects) while using Agile Development Methodology (for example Scrum and XP)?

  Explain what his type of error message

Regards to a computer error. In Linux Lubuntu 15.04, there is a common error message that appears as "Reboot: System Halted" wondering if anyone can explain what his type of error message is and what it means.

  Kinds of stakeholders for a home control unit

1. Identify three kinds of stakeholders for a Home Control Unit and briefly describe how they would interact with, or be affected by, individual HCUs and introduction of HCUs into the local community.

  Discuss developing a mechanism within http for doing this

Discuss developing a mechanism within HTTP for doing this.

  Discuss why projects often fail

Discuss why projects often fail. Give a specific example which may lead to project failure.

  Different types of session hijacking

Question 1: Describe different types of session hijacking. Also research session hijacking on internet and see if you can find a case where session hijacking was successfully used to perform an attack against a system. Include references in your a..

  Picks illegal number of sticks

If the user picks illegal number of sticks, the program will prompt the user to repick. At the end of each game, the program will prompt user to choose.

  The proliferation of mobility and mobile applications

Instructions: The proliferation of mobility and mobile applications in enterprise networks has increased the importance of mobile VPNs to provide secure communication channels to support mobile users in a wide variety of organizations

  Automata theory, grammars and languages ip

Task Background: This assignment involves solving problems by using various discrete techniques to model the problems at hand. Quite often, these models form the foundations for writing computer programming code that automate the tasks. To carry ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd