Complete the given host defenses matrix

Assignment Help Computer Engineering
Reference no: EM131168707

Learning Team Collaboration: Host Defenses


Complete the below Host Defenses matrix by discussing the various attacks and defenses of the company in each of the rows as they relate to a security advisory that your learning team will present to the management group of XYZ Company for which your team is serving as consultants.

Focus the discussion on the use of Host Defenses to answer the question in the worksheet below as they relate to malware, password attacks and other hardening tools that will be used to protect the company, specifically in relation to the following sections of TestOut® for LabSim Security Pro module, " Host Defenses":

• Section 8.1: Malware
• Section 8.2: Password Attacks
• Section 8.3: Windows System Hardening
• Section 8.4: Hardening Enforcement
• Section 8.5:File Server Security
• Section 8.6: Linux Host Security
• Section 8.7: Static Environment Security

Host Defenses Matrix


Issues and Resolutions

I.Today's Malware attacks are often subtle, using email and "safe" websites to distribute their programs. Discuss prevention and mitigation of this type of attack.


 II.Passwords are one of the single points of failure in a network access control.Discuss the proper use of passwords and their ability to add to the network security.


III.Software companies (Microsoft, Adobe, etc.) post updates their software on a periodic basis.Discuss the importance of timely updates and the dangers of not updating the security patches on time.


IV.Discuss the use of group policies and how they can help defend the network from outside penetration.


 V.Company data is often stored on file servers.The issue is permissions.Not all attacks come from outside the company.Give examples of areas where the internal danger is higher than that outside the network.


VI.Use of firewall is an understood part of the network security.Using this device properly is often not understood.Discuss the various issues that can result from an incorrectly configured firewall.


Reference no: EM131168707

Develop a problem-based strategy for creating

CE00882-4 Develop a problem-based strategy for creating and applying programmed solutions using an object-oriented paradigm - Use an object-oriented development environment in

What will be the values of h1 and h2

Consider two cache organizations both of them are using 32KB cache,32 bit physical address and 32B blocks. The 1st one is 2-way set associative cache, 2nd one is direct mapp

Harley-davidson implements rfid

When Harley-Davidson implements RFID, it will likely use the technology to help manage its relationships with its main customers, which are the local dealerships that sell m

Values of the cf and of

assume that EAX contains a given contents before the instruction is executed, and give the contents of EAX as well as the values of the CF, OF, SF, and ZF flags after the in

Do you agree with the inquisitors interrogation of veronese

Do you agree with the Inquisitor's interrogation of Veronese about his painting, originally titled Last Supper Or, do you side with Veronese Explain your response. As an art

What is the symbol for the enter key

What is the symbol for the "Enter" Key? Set the default location to your own folder that you created (your name, or ITM1270). Make auto correction so that if you type "toin"

Designing an inventory management system

Xhemrock is a brake pad manufacturing company. This company utilizes the raw materials, like carbon powder, ash, iron, and resin. It wishes to design an inventory management

Applications of electronic data in health care field

Analyze the recent applications of the electronic data interchange within the health care field and find which is the most promising. Describe your rationale.


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd