Question

In: Computer Science

Discuss system hardening strategies and techniques including updates and patches, default logon/passwords, anonymous access, removal of...

Discuss system hardening strategies and techniques including updates and patches, default logon/passwords, anonymous access, removal of unneeded services, separation of production and development environments, and settings such as password length and complexity by answering the following questions:

What hardening guidelines or standards are you familiar with?
What steps have you taken to harden systems?
What function do each of the strategies discussed serve?
Research and provide a web link to an article regarding system hardening practices.

Solutions

Expert Solution

Answer1)

I am aware of all the hardening guidelines mentioned in the question. Starting with updates means that a company of software release new version with new facilities and features if previous older version to make things easy and attractive. Patches are also released by company so that the bugs in their system can't be compromised by attacker. Default login password are those credentials which set to default by any company. Removal of unneeded services means that services which are not used by anyone should be removed as they can be used by attacker to attack the system as they are not much secured by company. Password length is very important as long password make hacker difficult to guess and break.

Answer 2 and 3)

I have taken lot of steps to harden system which are as follows along with their strategies-

1) I have renamed and and disabled built in account like administrator to some other name because if by chance attacker get access of system so he will not able to recognize which is admin account.

2) I have also added a long password to access my bios because if attacker get an access of my bios then he will change the boot sequence and increase the chances of attack vector on my system.

3)I have also removed unwanted and unknown application from my system because they may contain virus and can cause harm.

Answer 4)https://www.tracesecurity.com/blog/articles/system-hardening-guidelines


Related Solutions

Discuss system hardening strategies and techniques including updates and patches, default logon/passwords, anonymous access, removal of...
Discuss system hardening strategies and techniques including updates and patches, default logon/passwords, anonymous access, removal of unneeded services, separation of production and development environments, and settings such as password length and complexity by answering the following questions: What hardening guidelines or standards are you familiar with? What steps have you taken to harden systems? What function do each of the strategies discussed serve? Research and provide a web link to an article regarding system hardening practices.
Strategies for supervising salespeople, including motivation and performance evaluation techniques?
Strategies for supervising salespeople, including motivation and performance evaluation techniques?
Discuss one of the pricing strategies examined in the textbook including details of how it is...
Discuss one of the pricing strategies examined in the textbook including details of how it is implemented within an organization. What type of business or industry might use this strategy? Provide a real-life example of a company that might utilize this strategy.
Discuss the complexity of the healthcare system related to lack of access to care.
Discuss the complexity of the healthcare system related to lack of access to care.
1) Outline and discuss the Singapore financial system including the strengths and weaknesses of the system....
1) Outline and discuss the Singapore financial system including the strengths and weaknesses of the system. (800 plus minus 100 words)
. Discuss the four generic strategies (cost, focus, etc.) including the pros/cons of each and when...
. Discuss the four generic strategies (cost, focus, etc.) including the pros/cons of each and when they might be most effective. For our purposes,  focus is considered one strategy (you don’t have to differentiate between cost focus and differentiation focus). What is the primary risk when discussing generic strategies? with real world example
Question 1 Describe a Business Continuity Management System including its BIA Strategies, plans, and Tests and...
Question 1 Describe a Business Continuity Management System including its BIA Strategies, plans, and Tests and Exercises that would be appropriate for the Organization. Justify your chosen strategies and type of exercises. Question 2. A) Outline key/distinguishing characteristics and objectives of Emergency Management, Crisis Management, Disaster Recovery Planning and Business Continuity Management? Provide brief examples of relevant past real world incidents requiring initiation of each of these activities. B) What is Business Continuity Management? List and explain in details the...
Discuss the assessment techniques of genitourinary system in the adult male and include one usual abnormal...
Discuss the assessment techniques of genitourinary system in the adult male and include one usual abnormal findings
Activity-based Costing is one of the cost accounting strategies. Discuss the ABC system and the main...
Activity-based Costing is one of the cost accounting strategies. Discuss the ABC system and the main differences between the traditional costing and the ABC systems.
Discuss two strategies that an EHR system can use to insure the data stored can be...
Discuss two strategies that an EHR system can use to insure the data stored can be recovered in case of a natural or man-made disaster such as a fire or a flood such as Hurricane Sandy. Explain why you think the method(s) you chose is a sound enough to provide this protection.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT