Describes hardening technique

Assignment Help Basic Computer Science
Reference no: EM133062255

Scenario

As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.

The following are issues to be addressed through hardening techniques:

1. Previous attempts to protect user accounts have resulted in users writing long passwords down and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess, such as words founds in the dictionary.

2. Every user, regardless of role, must have at least one unique user account. A user who operates in multiple roles may have multiple unique user accounts. Users should use the account for its intended role only.

3. Anonymous users of the web server applications should only be able to access servers located in the demilitarized zone (DMZ). No anonymous web application users should be able to access any protected resources in the Always Fresh IT infrastructure.

4. To protect servers from attack, each server should authenticate connections based on the source computer and user.

Tasks

Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.

Reference no: EM133062255

Questions Cloud

Benefits to use of cryptocurrency : While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.
BUS401 Business Finance Assignment : BUS401 Business Finance Assignment Help and Solution - What impact do changing interest rates have on the price of long-term bonds versus short-term bonds?
Significant impact on businesses and industries : We have viewed how Blockchain has made a significant impact on businesses and industries.
Benefits to use of cryptocurrency : While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.
Describes hardening technique : Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.
How will this purchase affect the company assets : JDK purchases two new delivery trucks for its service business, each at a cost of $25,000. How will this purchase affect the company assets
Unit 4.51 E-commerce Applications Assignment : Unit 4.51 E-commerce Applications Assignment Help and Solution, ATHE Level 4 Diploma in Computing - Assessment Writing Service
Cyber-attack can cause economic damage : There are a variety of ways that a cyber-attack can cause economic damage.
Investigation in medium to large organization : You must write an academic paper that provides an overview of required actions in an investigation in a medium to large organization

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Make use of kernel software

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)?

  Implement a multi-access threaded queue with multiple thread

Repeat Problem 7.2 using condition variables (in addition to mutex locks). Document the time for the same test case as above. Comment on the difference in the times.

  Does this mean the encryption scheme is secure

Consider a symmetric-key cryptosystem in which cryptographic keys are randomly selected from the set of all n-bit strings. Approximately what should n be in order to provide 128 bits of security against a birthday attack?

  Methods to integrate them into a business

Given the rise of mobile and e-commerce, what are the best methods to integrate them into a business.

  The executive board approved your security program charter

Explain the various control strategies such as detection and prevention and explain how each will be used.

  Three events concerning resource allocation

List and explain the three events concerning resource allocation. Define the following:

  List the five generations of firewall technology

How does a commercial-grade firewall appliance differ from a commercial-grade firewall system? Why is this difference significant?

  Calculate the current that flows when the phone is off hook

Suppose the voltage across a telephone line, at the subscriber, drops from 48 V to 10 V when the phone goes off hook.

  How network communications function

Understanding the function and responsibilities of each layer of the OSI model will help you to understand how network communications function.

  How many rounds of questioning

how many rounds of questioning?

  Sensitive personal information on her local workstation

A human resources manager stores a spreadsheet with sensitive personal information on her local workstation.

  Object oriented code syntax for the statement

Explain the object oriented code syntax for the statement below. Be as technical as possible, focusing on the mechanics of the syntax. In other words, break down the statement and explain what each part is doing from an object oriented point of vi..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd