Explain how you ensured the antivirus program is updated

Assignment Help Computer Engineering
Reference no: EM131952309

Assignment: System Hardening

Scenario

After the productive team meeting, Fullsoft's CTO engages in further analysis and establishes a plan to mitigate risks, threats, and vulnerabilities. As part of the mitigation plan, you and your team members will configure baseline security on all workstations. You will ensure that the antivirus software is running properly, remove unnecessary software and services, and implement a control related to password hacking attempts. You have been asked to train a new employee by demonstrating how to implement system hardening on a local workstation.

Tasks

Ensure that you are logged in as an administrator. Using a computer that has Windows 7* installed:

o Review the antivirus program and ensure it is up to date and running a full scan of the system.?

o Disable at least five unnecessary services from the default installation of Windows 7.?

o Configure audit logging to identify all failed password attempts into the system.?

* If possible, complete these tasks using a personal computer with the default installation of Windows 7. If you do not own the necessary hardware and software, consult with your Instructor about alternatives. After your work on this project is complete, you may need to return the settings to the previous configuration.?Then, for the employee you are training, write a summary of what you did and explain why system hardening is important. Include the following:

Summary?

o Explain how you ensured the antivirus program is updated and running a full scan of the system; describe anything significant you observed?

o Explain how you removed unnecessary services from the default installation of Windows 7, noting the five (or more) services by name and function?

o Explain how you configured audit logging to record all failed password attempts into the system. Rationale?

- Share an example of an IT security policy, standard, procedure, and guideline that relates to the system-hardening steps you have implemented?

o Explain the purposes of system hardening in terms of the company's overarching goal of maintaining information systems security.?

As a reminder,you may use the book for this course and the Internet to conduct research. You are encouraged to respond creatively, but you must cite credible sources to support your work.

Project Part 2 should be submitted in the following format and style:

o Format: Microsoft Word?

o Font: Arial, Size 12, Double-Space?

o Citation Style: Follow your school's preferred style guide?

o Length: 1-2 pages?

Self-Assessment Checklist?

· I have summarized the system-hardening steps I implemented on a computer using Windows 7, including:

o How I ensured the antivirus software is running properly?

o How I removed at least five unnecessary services, noting the services by name and

o function?

o How I configured audit logging of all failed password attempts

· I have provided an example to illustrate how system hardening relates to a company's IT security policy framework and explained the purposes of system hardening in terms of the company's overarching goal of maintaining information systems security?

I have conducted adequate independent research for this part of the project?

Reference no: EM131952309

Questions Cloud

Discuss the unified theory for services management : Discuss the unified theory for services management developed by Dr. Scott Sampson. Do you agree or disagree with the principles underlying Sampson's theory?
How can you systematically detect bias in decisions : How can you systematically detect bias in your own decisions and biases in others?
Develop a consumer benefits package : Develop a consumer benefits package for a service business in your community. Be exhaustive and explicit in your package identification.
What is the commerce clause : What is the Commerce Clause? What is the legal analysis used by the courts to grant the federal government almost limitless authority to regulate business
Explain how you ensured the antivirus program is updated : Explain how you ensured the antivirus program is updated and running a full scan of the system; describe anything significant you observed?
Perform a two-dimensional differencing analysis : For the data in Problem, perform a two-dimensional differencing analysis. Do your results differ from your answer in Problem?
Draw the payoff diagram to illustrate the payoff : FIN380/Multinational Finance Homework - Please draw the payoff diagram to illustrate the payoff. Where is the break-even point
Training program for a group of twenty employees : Suppose you are going to conduct a training program for a group of twenty employees. These employees are different in age and gender.
Perform an sql injection attack on the demo grading website : Perform an SQL injection attack on the demo grading website. The general steps for performing an SQL injection attack with virtnet are described.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd