Windows Hardening Recommendations

Assignment Help Basic Computer Science
Reference no: EM133047752

Windows Hardening Recommendations

Scenario

As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.

The following are issues to be addressed through hardening techniques:

1. Previous attempts to protect user accounts have resulted in users writing long passwordsdown and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess, such as words founds in thedictionary.

2. Every user, regardless of role, must have at least one unique user account. A user whooperates in multiple roles may have multiple unique user accounts. Users should use the account for its intended roleonly.

3. Anonymous users of the web server applications should only be able to access servers located in the demilitarized zone (DMZ). No anonymous web application users should be able to accessany protected resources in the Always Fresh ITinfrastructure.

4. To protect servers from attack, each server should authenticate connections based on thesource computer anduser.

Tasks

Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.

Reference no: EM133047752

Questions Cloud

Find the maximum profit : If the total revenue and total cost functions are TR = 36Q - Q2 and TC = 10 + 3Q, find the maximum profit.
Information on competitors of amazon in e-commerce industry : Information on competitors of Amazon in e-commerce industry? With revenue and market share. Few example in each segment in e-commerce.
Find out contemporary technologies : Do you think social media and other contemporary technologies (e.g., computers, the internet, smartphones, etc.) change your mind and consciousness, and if so,
How much is Lunar net income or loss : Lunar did not issue common stock during the year, but it paid $15,000 cash in dividends. How much is Lunar's net income or loss for 2021
Windows Hardening Recommendations : Previous attempts to protect user accounts have resulted in users writing long passwordsdown and placing them near their workstations.
Explain the meaning of law : 1. Explain the meaning of law. 2. Discuss each of the subdivisions of the law.
Review software license agreements : Review software license agreements in your textbook and research them online.
Determine the average interest capitalization rate : For financial reporting purposes, determine the average interest capitalization rate used for the years ended September 30, 2019 and 2020
Defense in Depth : A common model for security is called "Defense in Depth." Suggest set of security protections you would recommend that are in line for adequate defense in depth

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Company data from personally-owned mobile devices

Management approved a pilot program in which a controlled group of users can access certain company data from personally-owned mobile devices

  Real-life application of big data in an organization

Research, evaluate, and discuss a real-life application of Big Data in an organization. How does the organization's integration of Big Data.

  Problem regarding the modularizing code

Imagine you are a part of a team that is tasked with writing a mobile application (app) that will allow users to send pictures to their friends. The manager does not want to waste time creating code modules. Describe at least one (1) advantage of ..

  Evaluate worst case time-complexity of the sparse matrix

Provide the code to implement the four basic operations - traversal, search, insertion, deletion - for an unsorted doubly linked list.

  Name a popular password cracking tool

Name a popular password cracking tool and discuss its advantages and disadvantages.

  Charismatic-transformational and authentic leadership

Distinguish between charismatic, transformational, and authentic leadership. Could an individual display all three types of leadership?

  Wireless lan security

Wireless LAN Security. Please include the content when describing Wireless LAN Security. Advantages/Disadvantages of Wireless LAN Security.

  Download free network monitoring tools

Hundreds of network monitoring tools exist. You can purchase or download free network monitoring tools developed by software companies.

  Do these benefits outweigh the loss of your privacy

What benefits can consumer profiling provide to you as a consumer? Do these benefits outweigh the loss of your privacy?

  Discuss the five elements of the business environment

Provide for each of the following using a current US based business you have chosen. Include references where appropriate.

  Calculate and output the mean and median of collected data

Design a program that will allow some number of grades (up to a max of 100) to be input by the user. After the data has been collected, your program should calculate and output the mean and median of the collected data, as well as the sorted grade..

  Identify such points during the data cube computation

Suppose a partially materialized cube has (d - 1)-dimensional and (d + 1)- dimensional cuboids materialized but not the d-dimensional one. Derive an efficient method to mark those (d - 1)-dimensional cells with d-dimensional children that contain ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd