Develop hardening checklist for windows

Assignment Help Computer Engineering
Reference no: EM131722892

Develop Hardening Checklist for Windows 10

One of the most useful tools you will use in your role as an Information Security professional is a hardening checklist. Essentially, it is a document that serves as a guide to configuring a desktop / system security. Please develop this guide for a windows 10 desktop environment.

The hardening checklist will take the form of a table or chart that lists how the Windows 10 desktop should be hardened. This will be culmination of everything you have learned, in terms of Operating Systems, Security Controls, and various strategies that can be employed.

Essentially this documents will summarize everything you know about securing a system in an easy to follow checklist. You should try to provide a short and quick one sentence description on each setting or task that you are recommending in the checklist.

Reference no: EM131722892

Questions Cloud

Discuss manager wants me to create some custom programs : old job and my manager wants me to create some custom programs
Explain the manner in which each of events you have chosen : Explain the manner in which each of the events you have chosen contributed to starting the War. Provide a rationale for your response.
Puritan-colonial and enlightenment : Compare and contrast between these literary periods puritan-colonial and enlightenment (age of reason)?
The vulnerability of nuclear facilities to cyber attacks : The Vulnerability of Nuclear Facilities to Cyber Attacks, With the knowledge gleaned from the course, create
Develop hardening checklist for windows : Develop Hardening Checklist for Windows, One of the most useful tools you will use in your role as an Information Security professional is a hardening checklist
Declaration of independence : Declaration of Independence- do a brief statement (couple of paragraphs) describing the reasons for your formation of a utopian society.
Create your own survey research : Create a draft of your survey in Microsoft Word. The survey should be about 10 minutes long. The topic of your survey should be something .
What is the weighted average cost of debt : What is the weighted average cost of debt for TSLA using the book value weights and using the market value weights
Discuss information security incidents are caused by hackers : The majority of the most damaging information security incidents are caused by hackers

Reviews

Write a Review

Computer Engineering Questions & Answers

  What was the strategic benefit to microsoft of outsourcing

what was the strategic advantage to microsoft of outsourcing xbox production to flextronics?what were the risks

  How java programming knowledge benefits nonprogramming

How does information of programming concepts benefits individuals working in almost any IT position? Include at least one specific example of how java programming knowledge benefits nonprogramming working in IT?

  Define what is scope creep

Define what is scope creep. Illustrate scope creep with reference to a project you know about. Could the scope creep be avoided? Can scope creep be a good thing and under what circumstances?

  Question1 decrypt the following encrypted quotation by

question1. decrypt the following encrypted quotation by shakespeare.fqjcb rwjwj vnjax bnkhj whxcq nawjvnfxdu mbvnu

  Describe the four different types of joins

Describe the four different types of "joins" and provide examples of how you would use each.

  Write down an sql statement

Write down an SQL statement

  Explain the key elements of recovering from lost assets

Describe and explain the key elements of recovering from lost assets. o What are Internet connected systems? Describe five examples. How does encryption work? Why is it considered a premier tool in IT Security?

  What is a disaster recovery plan

What are the DBA's responsibility regarding access privileges? What is a disaster recovery plan? What is LAN

  Recognizing the error in code

Suppose that the variable A is an arrays of ints. Take the following code segment:Boolean flag = false;

  Can hackers tell that you have a honeypot running

What impact would more open ports have on the ability of your honeypot to attract hackers? Can hackers tell that you have a honeypot running?

  How to support multiple incoming requests via threads

The email database server is designed to accept multiple incoming requests via a socket in order to locate a specific message and return it to the client email browser (such as Outlook Express).

  Why prepaid cell phones make forensic investigation hard

Discuss about how can you quickly investigate and collect digital evidence for a crime what involves a phone call (e.g., you checked the victim's cell phone and you find a phone call from a phone number, this phone number could be a VoIP phone, a ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd