Discuss the importance of hardening

Assignment Help Basic Computer Science
Reference no: EM131544350

You provide a lecture to the working group regarding the importance of security education, awareness, and training due to the oft quoted security maxim that users/humans are the weakest link in the security chain. While making users aware of security risks and training them how to protect company assets will reduce risk, it is important to put technical controls in place to protect the operating systems and applications that employees use every day.

Discuss the importance of "hardening" the PCS client workstations and servers. Make recommendations for operating system hardening options and describe how these are related to the concept of "system-specific policies" discussed earlier in the course. One of the working group members blurts out that antivirus protection is a waste of computing resources and patching applications takes too much time. Be sure to address these two concepts in your initial thread. Include at least one research reference and associated in-text citation using APA standards. In your replies to your peers further discuss the importance of software security.

Reference no: EM131544350

Questions Cloud

On what basis do the courts uphold punitive damages : On what basis do the courts uphold punitive damages? Was there a cover-up at Ford regarding the knowledge of the Exploding Pinto? Discuss.
Which country will be the dominant country in the world : How has the status on women changed in the post 1945 world? Discuss this issue in relation to at least two individual countries or regions.
Create an essay in which you can show your ability : Create an essay in which you can show your ability to more deeply examine the problem and the reporting.
Develop a program that meets : Your consulting firm has been hired to develop a program that meets the following requirements.
Discuss the importance of hardening : Discuss the importance of "hardening" the PCS client workstations and servers. Make recommendations for operating system hardening options.
Effect of debasing imperial coinage : Debasing imperial coinage had the effect of reassuring people that the government had sufficient money to maintain peace.
Examine the medical news today page on stem cells : Examine the Medical News Today (MNT) page on stem cells .Stem cells are the basis for every organ and tissue in our bodies.
Importance of network security devices : In your replies to your peers further discussing the importance of network security devices.
Assess the strengths and limitations of the application : Assess the strengths and limitations of the application, based on product reviews, a case study, and/or personal or professional experience.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How standards may be used to capture organizational wisdom

Suggest four types of knowledge that might be captured in organizational standards.

  The importance of it and how it has increased over the years

the importance of IT and how it has increased over the years as more technology enters daily use

  Overall objectives of a company

Discuss the procurement contract life cycle. How does this support the overall objectives of a company?

  Breaking into the mobile device market

Hasn't Intel had a problem with breaking into the mobile device market? Why is that? What might we attribute as the cause of the problem?

  Use a random-number generator to pick each card

Your program must incorporate a two-dimensional array to represent the suit and the value of each card dealt to a player, keep track of which cards have been dealt to which player, and use a random-number generator to pick each card to be dealt to..

  Design the most appropriate public key infrastructure

Design the most appropriate Public Key Infrastructure (PKI) to protect Personal Identifiable Information (PII).

  User computer by a web server-contains information

A cookie-a simple text file that is placed on a user's computer by a Web server-contains information about the user's visit to that website. It might also contain personal information a user provides to a website, such as a user name and preferenc..

  Which files match with the pattern file[abc]

which files match with the pattern " file[ABC] "

  Workplace calls for a lot of planning

Installing Linux on somebody else's machine or in a location that is not your own workplace calls for a lot of planning.

  How enterprise architecture and enterprise systems

1. How enterprise architecture and enterprise systems influence, support, and enable an organization's ability to contribute to strategic decision-making.2. How enterprise architecture and enterprise systems respond and adapt to the business environm..

  Estimate the mean and variance of the number of times

Estimate the mean and variance of the number of times you have to roll 2 dice until the total exceeds 100.

  Information and record the data

How does the person conducting a Job Analysis study using the interview approach actually collect the information and record the data that they are collecting?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd