How the windows ten desktop should be hardened

Assignment Help Basic Computer Science
Reference no: EM131310482

Develop Hardening Checklist for Windows 10

One of the most useful tools you will use in your role as an Information Security professional is a hardening checklist. Essentially, it is a document that serves as a guide to configuring a desktop / system security. Please develop this guide for a windows 10 desktop environment.

The hardening checklist will take the form of a table or chart that lists how the Windows 10 desktop should be hardened. This will be culmination of everything you have learned, in terms of Operating Systems, Security Controls, and various strategies that can be employed. Essentially this documents will summarize everything you know about securing a system in an easy to follow checklist. You should try to provide a short and quick one sentence description on each setting or task that you are recommending in the checklist.

Note:

1) Minimum of 5 pages

2) No Plagiarism.

Reference no: EM131310482

Questions Cloud

What changes have recently occurred in kalewoods deposit mix : What changes have recently occurred in Kalewood's deposit mix? Do these changes suggest possible problems for management in trying to increase profitability and stabilize earnings?
Develop a wireless and remote connectivity assessment : Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal.
Calculate the current rating of the fuse : Design the width of the fusing section so that it will break at currents above I = 20 A This design is typical of automotive fuses (although pure copper is almost never used because of oxidation problems).
Discuss about the enterprise security plan : Discuss about the Enterprise Security Plan.Include the following:Physical and Logical security measures for your network,Selected encryption methods,Programs to educate users about wireless security.
How the windows ten desktop should be hardened : The hardening checklist will take the form of a table or chart that lists how the Windows 10 desktop should be hardened.
How much interest will have accrued : How much will you owe on the credit card if you have not made a payment for 6 months?- How much interest will have accrued?
Develop an application for a pick three lottery game : Create an interface and develop an application for a Pick 3 Lottery Game. The application needs to show 3 randomly generated numbers based on a range of numbers provided by the users.
Discuss the global social and legal issue with digital media : Students are required to select a topic and discuss the global, social, ethical, and legal issues with digital media in relation to that topic. You will perform in-depth research.
Identify the top companies in the industry : Identify the top companies in the industry using your own selection of criteria (market capitalization, ROE, or any other financial criteria you wish to develop.) Your decisions on which set of criteria to use, are to be considered part of the pro..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Build a requirements model of the system

Do a few hours of research on the application area and conduct a FAST meeting (Chapter 11) with your fellow students to develop requirements (your instructor will help you coordinate this). Build a requirements model of the system using structured..

  Essay on marketing and hospitality management styles

Find two articles pertaining to marketing and hospitality management styles. The articles should be less than three years old and should exceed three pages in length. Analyze and evaluate the articles as to their relevance in today's marketplace, ..

  Relation to information security

For each term that you choose, define it and explain it in relation to Information Security as well as any positive or negative impact it has on the field of IT Security. Terms are: Block storage and ROT(Redundant, outdated, trivial information)

  Installing the new operating system

Your supervisor tasked you with installing the new operating system from Microsoft on all desktops and laptops in the company.

  You have been asked to develop uml diagrams to graphically

you have been asked to develop uml diagrams to graphically depict and describe the architecture of two 2 unrelated

  Swapping the contents of two registers

Write MIPS assembly code for swapping the contents of two registers, $t0 and $t1. You may not use any other registers.

  How many days it will take to produce any number of widgets

(The plant operates two shifts of eight hours each per day.) Write a program that asks the user for the number of widgets that have been ordered and then displays the number of days it will take to produce them.

  Where do values originate

Where do values originate? Can they be altered? Explain by using an example.

  Distinguish between traditional and operational bi

Distinguish between traditional and operational BI.

  Construct an example where m does not satisfy the condition

Construct an example where M does not satisfy the condition (5.13), and the original problem has an optimal solution, while the big-M version is unbounded.

  Why is identity verification so important

Lets say you have an Intel PC running Microsoft Windows 7 and attached to the PC via a PCI connection is a credit card swipe terminal.

  Modules in c are called functions

Modules in C are called functions. C programs are typically written by combining user-created functions as well as "pre-packaged" functions found in the C Standard Library. For instance, printf() is a function that is found in the C Standard Library ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd