Windows hardening recommendations

Assignment Help Basic Computer Science
Reference no: EM133058596

Windows Hardening Recommendations

Scenario

As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.

The following are issues to be addressed through hardening techniques:

1. Previous attempts to protect user accounts have resulted in users writing long passwords down and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess, such as words founds in the dictionary.

2 Every user, regardless of role, must have at least one unique user account. A user who operates in multiple roles may have multiple unique user accounts. Users should use the account for its intended role only.

3 Anonymous users of the web server applications should only be able to access servers located in the demilitarized zone (DMZ). No anonymous web application users should be able to access any protected resources in the Always Fresh IT infrastructure.

4 To protect servers from attack, each server should authenticate connections based on the source computer and user.

Tasks

Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.

Reference no: EM133058596

Questions Cloud

Standards for network security : What do you think were the critical factors that fueled the need for IT governance? In what ways did ISO affect the standards for network security?
Today global economy : Today's Global Economy is very top-down driven with the government making all the decisions and regulations as it relates to doing business globally
Analyze complex computing problem : Analyze a complex computing problem to apply principles of computing and other relevant disciplines to identify solutions.
COSO framework of internal controls is practiced : The COSO framework of internal controls is practiced within companies around world. discuss suggestions for integrating COSO framework compliance into a company
Windows hardening recommendations : Anonymous users of the web server applications should only be able to access servers located in the demilitarized zone (DMZ).
Access Control : Should you encrypt data before transferring it to the cloud or encrypt it after it is stored in the cloud? Explain your answer.
Security awareness trainer : When a user does not follow security procedures, what are two consequences to the organization you would emphasize? Why?
Mobile Operating Systems : Declare your favorite device and share 2-3 of the best features of that brand's mobile operating system.
Create visual workflow chart : Create a visual workflow chart of Hospital Admission that includes five or more steps. Create the workflow using Microsoft Word

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Demonstrate connection to your desired work environment

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

  Software licensing is major problem in cloud computing.

Software licensing is a major problem in cloud computing.

  Certified management accountant certification

What types of accounting certification exist. In particular research the Certified Public Accountant (CPA) and Certified Management Accountant certification

  What is telecommunications act

What is the Telecommunications Act of 1996? How has the idea of offensive speech changed since technology has progressed?

  Appropriate message to the screen

Write a Java program, called LinearSearchTwo that contains a static method called findElement() that accepts a 2D char array and a char as its parameters and return a boolean value if the char is contained in the 2D char array. The array and searc..

  Equation using function notation

Find an equation of the line passing through the given points. Write the equation in function notation. (4,-7) and (-3,-4) F(x)= Find an equation of the line. Write the equation using function notation. Through (-3, -5); parallel to 4x + 3y=7 F(x)..

  Computer internet security policy

Make sure you are sufficiently specific in addressing each area. The plan should reflect the business model and corporate culture of a specific organization

  Determine the primary number of turns

The secondary of a 750 KVA, 11000/ 400 V, 50 Hz transformer has 160 turns. Determine the primary number of turns, primary and secondary full load current neglecting losses. If the area of cross section of the core is 100 cm2, what will be flux dens..

  Enterprise resource planning

As an IT manager, discuss how your company will use Enterprise Resource Planning (ERP) to integrate the various functions of an entity.

  Data mining from other analytical tools and techniques

What are the main reasons for the recent popularity of data mining? Distinguish data mining from other analytical tools and techniques.

  Structured english for clyde-s narrative of reimbursement

On trip lasting more than one day, we permit hotel, taxi, and airfare, also meal allowances. Same times apply for meal expenses." Write structured English for Clyde's narrative of reimbursement policies.

  Respond to those who think they can just start coding or

Respond to those who think they can just start coding or writing specifications without utilizing the systems development methodology?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd