Security configuration and analysis

Assignment Help Basic Computer Science
Reference no: EM132395498

A comparison of existing security controls and settings with one or more baselines helps to validate the correctness of security controls. The process of comparing real computer configurations to known baselines, also called profiling, is important to ensure your configurations are correct and secure.

For each of the following scenarios, select the best tool to profile a Windows computer to determine if it satisfies your security requirements, and write at least 2 pages about these scenarios and the tools you selected.

You must select from the following options:

Security Configuration and Analysis (SCA)

Microsoft Security Baseline Analyzer (MBSA)-Graphical User Interface (GUI)

MBSA command-line interface

Shavlik NetChk Protect

Secunia Security Analyzers

Suspected malware scenarios:

You want to schedule a weekly analysis for the Windows servers in your data center. The command should run as a scheduled job and report any available patches for the Windows Server 2012 R2 operating system, Internet information services (IIS) Web server, or structured query language (SQL) server that have not been installed. Which tool would be the best choice?

You like the way MBSA presents scan results but you need to scan for vulnerabilities in older Windows products, including Microsoft Office 2000. Which tool provides extended scanning and the ability to use MBSA to view scan reports?

Your organization wants to encourage all of its employees and contractors to use vulnerability scanners at home as well as at work. You want to select a single vendor that can provide scanner software products for home and enterprise computers. A single vendor product line can streamline coordinating and analyzing scan results from many different computers. Which set of tools would be the best choice?

You have developed several templates that consist of security settings for several types of computers, including desktop workstations, laptops, and various servers. You want to quickly compare a computer's settings to its corresponding template to see if any configuration settings have changed. Which tool would be the best choice?

Reference no: EM132395498

Questions Cloud

Practical experience with physical security protocols : What is your practical experience with Physical Security Protocols? What do you hope to gain from this weekend's residency session,
Find the sequence of stock prices for the two period : For each period the stock can go up to 15% and down by 5%. The exercise price of this call option is $45.
Methods of Teaching and Integrating Science and Health : ELM-570: Methods and Strategies of Teaching and Integrating Science and Health assignment help and solutions, Grand Canyon University - Observing a classroom.
How much was available to withdraw at 200 year mark : Then they could take out half and leave the other half for the next hundred years. How much was available to withdraw at 200 year mark if they earned 6%?
Security configuration and analysis : Security Configuration and Analysis, Secunia Security Analyzers, Microsoft Security Baseline Analyzer (MBSA)-Graphical User Interface (GUI)
What would the djia level be at the end of the day : What would the DJIA level be at the end of the day? (Do not round intermediate calculations. Round your answer to 2 decimal places.)
ECON1247 Prices and Markets Assignment Problem : ECON1247/ ECON1275 Prices and Markets Assignment Help and Solution, Royal Melbourne Institute of Technology - RMIT University, Australia
In which case would you have more money at age 60 : At age 20 you invest $500 each year that earns 6 percent each year. At age 30 you invest $500 each year that earns 10 percent per year.
What conclusions can you draw about the relationships : The data are the results of chemical analysis of wines grown in the same region but derived from three different cultivars. What can you say about the class.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Country of cuba for the purposes of negotiating

The Governor of the State of Florida traveled to the country of Cuba for the purposes of negotiating a treaty to promote the trade and importation of tobacco into his state for the benefit of Florida's cigar industry.

  Everyone needs access to the internet

According to many, the digital world is being divided into 'haves' and 'have nots' - between those that have access and can use a computer and the Internet

  Generalization of the triangular-matrix method

How would you count all item sets of size 3 by a generalization of the triangular-matrix method? That is, arrange that in a one-dimensional array there is exactly one element for each set of three items.

  Development of renewable resource energy production

Sixty-five nations sign a treaty pledging caps on industrial emissions and the development of renewable resource energy production.

  Financial institutions to guard against insider threats

Discuss 4 security measures that have been implemented by financial institutions to guard against insider threats?

  Different approach to addressing poverty

Note: Two books I have found very helpful and take a little different approach to addressing poverty are Walking with the Poor by Bryans Myers (2011 published by Orbis Books) and When Helping Hurts by Steve Corbett and Brian Fikkert (2012 publishe..

  How do threads t1 and t2 communicate

How do threads T3 and T4 communicate? How could threads T1 and T3 communicate? Explain your answer.

  Commercial project for an institution

You are a software developer doing a commercial project for an institution. Taking Python as your development language, give two advantages of using python for that task.

  Investigation an e-mail harassment case

Would you suggest collecting evidence for the case be handled by internal corporate investigations or by an outside criminal investigation organization?

  What is the index of the component that is deleted

a. What is the index of the component that is deleted? b. What is the index of the component that takes its place? c. What does the Length operation return after the deletion? d. How many components in the list change their positions as a result o..

  Public relations side of the revive brand campaign

Determine objectives and describe how you would employ public relations tools to help you launch your revitalization campaign.

  Determine the value of the variables

Determine the value of each of the indicated variables after the following code executes. Assume that each integer occupies 4 bytes.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd