Explain how you ensured the antivirus program is updated

Assignment Help Computer Engineering
Reference no: EM131952309

Assignment: System Hardening

Scenario

After the productive team meeting, Fullsoft's CTO engages in further analysis and establishes a plan to mitigate risks, threats, and vulnerabilities. As part of the mitigation plan, you and your team members will configure baseline security on all workstations. You will ensure that the antivirus software is running properly, remove unnecessary software and services, and implement a control related to password hacking attempts. You have been asked to train a new employee by demonstrating how to implement system hardening on a local workstation.

Tasks

Ensure that you are logged in as an administrator. Using a computer that has Windows 7* installed:

o Review the antivirus program and ensure it is up to date and running a full scan of the system.?

o Disable at least five unnecessary services from the default installation of Windows 7.?

o Configure audit logging to identify all failed password attempts into the system.?

* If possible, complete these tasks using a personal computer with the default installation of Windows 7. If you do not own the necessary hardware and software, consult with your Instructor about alternatives. After your work on this project is complete, you may need to return the settings to the previous configuration.?Then, for the employee you are training, write a summary of what you did and explain why system hardening is important. Include the following:

Summary?

o Explain how you ensured the antivirus program is updated and running a full scan of the system; describe anything significant you observed?

o Explain how you removed unnecessary services from the default installation of Windows 7, noting the five (or more) services by name and function?

o Explain how you configured audit logging to record all failed password attempts into the system. Rationale?

- Share an example of an IT security policy, standard, procedure, and guideline that relates to the system-hardening steps you have implemented?

o Explain the purposes of system hardening in terms of the company's overarching goal of maintaining information systems security.?

As a reminder,you may use the book for this course and the Internet to conduct research. You are encouraged to respond creatively, but you must cite credible sources to support your work.

Project Part 2 should be submitted in the following format and style:

o Format: Microsoft Word?

o Font: Arial, Size 12, Double-Space?

o Citation Style: Follow your school's preferred style guide?

o Length: 1-2 pages?

Self-Assessment Checklist?

· I have summarized the system-hardening steps I implemented on a computer using Windows 7, including:

o How I ensured the antivirus software is running properly?

o How I removed at least five unnecessary services, noting the services by name and

o function?

o How I configured audit logging of all failed password attempts

· I have provided an example to illustrate how system hardening relates to a company's IT security policy framework and explained the purposes of system hardening in terms of the company's overarching goal of maintaining information systems security?

I have conducted adequate independent research for this part of the project?

Reference no: EM131952309

Questions Cloud

Discuss the unified theory for services management : Discuss the unified theory for services management developed by Dr. Scott Sampson. Do you agree or disagree with the principles underlying Sampson's theory?
How can you systematically detect bias in decisions : How can you systematically detect bias in your own decisions and biases in others?
Develop a consumer benefits package : Develop a consumer benefits package for a service business in your community. Be exhaustive and explicit in your package identification.
What is the commerce clause : What is the Commerce Clause? What is the legal analysis used by the courts to grant the federal government almost limitless authority to regulate business
Explain how you ensured the antivirus program is updated : Explain how you ensured the antivirus program is updated and running a full scan of the system; describe anything significant you observed?
Perform a two-dimensional differencing analysis : For the data in Problem, perform a two-dimensional differencing analysis. Do your results differ from your answer in Problem?
Draw the payoff diagram to illustrate the payoff : FIN380/Multinational Finance Homework - Please draw the payoff diagram to illustrate the payoff. Where is the break-even point
Training program for a group of twenty employees : Suppose you are going to conduct a training program for a group of twenty employees. These employees are different in age and gender.
Perform an sql injection attack on the demo grading website : Perform an SQL injection attack on the demo grading website. The general steps for performing an SQL injection attack with virtnet are described.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Make function that outputs the elements stored in the tree

Write down a program containing a function that outputs the elements stored in the tree (integers) to the screen. The integers have to be output level by level in the order they appear in the tree.

  Identify and describe based on your review existing and

review the operations page for riordan manufacturing.identify and describe based on your review existing and needed

  Contingency theory and path goal theory

Contingency Theory and Path Goal Theory- Path-Goal Theory is a type of Contingency Theory because its effectiveness depend on the match between leader behavior, the task at hand, and characteristic of  subordinates.

  How will you use kill to ensure that a process is killed

How will you use kill to ensure that a process is killed? How will you kill the last background job without knowing its PID?

  Determine the mean-square error for a uniform quantizer

[Uniform Quantizer Distortion] Determine the mean-square error for a uniform quantizer with 12 quantization levels, each of length 1, designed for a zero-mean.

  Calculates and displays the parking charges

Write an application that calculates and displays the parking charges for each customer who parked in the garage yesterday.

  Express wpan, wlan, wan, rfid, and gps

can someone assist me in understanding the following WPAN, WLAN, WAN, RFID, and GPS.

  Questionexplore paper on vmware securityoutline a

questionexplore paper on vmware securityoutline a. introductiona. definition b. background c. frameworkb. bodya.

  Define the importance of that commandment

Modern relational database management systems have been around for a relatively short period of time. As time goes by, more and more emphasis has been placed on design issues, especially database modeling. What is the reason for this increased emp..

  How many probes are involved when double hashing is used

About how many probes are involved when double hashing is used to build a table consisting of N equal keys?

  How time-variant data can be properly captured

Historical data can be important to measuring performance. Prepare an example on how time-variant data can be properly captured and maintained within a database system.

  Discuss differences between a virus and a trojan horse

Describe the similarities and differences between a virus, a Trojan horse, and a worm

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd