Discussion about the security configuration and analysis

Assignment Help Computer Engineering
Reference no: EM132387731

Assignment: A comparison of existing security controls and settings with one or more baselines helps to validate the correctness of security controls. The process of comparing real computer configurations to known baselines, also called profiling, is important to ensure your configurations are correct and secure.

For each of the following scenarios, select the best tool to profile a Windows computer to determine if it satisfies your security requirements, and write at least 2 pages about these scenarios and the tools you selected.

You must select from the following options:

1. Security Configuration and Analysis (SCA)

2. Microsoft Security Baseline Analyzer (MBSA)-Graphical User Interface (GUI)

3. MBSA command-line interface

4. Shavlik NetChk Protect

5. Secunia Security Analyzers

Suspected malware scenarios:

1. You want to schedule a weekly analysis for the Windows servers in your data center. The command should run as a scheduled job and report any available patches for the Windows Server 2012 R2 operating system, Internet information services (IIS) Web server, or structured query language (SQL) server that have not been installed. Which tool would be the best choice?

2. You like the way MBSA presents scan results but you need to scan for vulnerabilities in older Windows products, including Microsoft Office 2000. Which tool provides extended scanning and the ability to use MBSA to view scan reports?

3. Your organization wants to encourage all of its employees and contractors to use vulnerability scanners at home as well as at work. You want to select a single vendor that can provide scanner software products for home and enterprise computers. A single vendor product line can streamline coordinating and analyzing scan results from many different computers. Which set of tools would be the best choice?

4. You have developed several templates that consist of security settings for several types of computers, including desktop workstations, laptops, and various servers. You want to quickly compare a computer's settings to its corresponding template to see if any configuration settings have changed. Which tool would be the best choice?

Reference no: EM132387731

Questions Cloud

What kind of power might a local community : What kind of power might a local community use to influence a company's decisions?
How do executives balance their ethical responsibilities : How do executives balance their ethical responsibilities to employees, suppliers, regulators, investors, and communities?
What information was targeted : Search "scholar.google" for a company, school, or person that has been the target of a network or system intrusion? What information was targeted?
Thinking about an organizational culture : Thinking about an organizational culture with which you are familiar, what benefits can socialization provide for the organization?
Discussion about the security configuration and analysis : A comparison of existing security controls and settings with one or more baselines helps to validate the correctness of security controls.
What is the equity-type : What is the equity-type (difference between assets and liabilities) account in the US federal government called?
What can organizations do to foster innovation : What can organizations do to foster innovation and creativity from their employees?
Discuss the organization and reason for selecting it : You are a Consultant tasked with creating an ERM for an organization. You can choose an organization you are familiar with, your own organization or make one up
Policy design different from intuitive policy making : How is the model-based policy design different from intuitive policy making? What are the techniques currently used to build models?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd