Reference no: EM132600676
Project Part 8: Windows Hardening Recommendations
Scenario
As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.
The following are issues to be addressed through hardening techniques:
1. Previous attempts to protect user accounts have resulted in users writing long passwords down and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess, such as words founds in the dictionary.
2. Every user, regardless of role, must have at least one unique user account. A user who operates in multiple roles may have multiple unique user accounts. Users should use the account for its intended role only.
3. Anonymous users of the web server applications should only be able to access servers located in the demilitarized zone (DMZ). No anonymous web application users should be able to access any protected resources in the Always Fresh IT infrastructure.
4. To protect servers from attack, each server should authenticate connections based on the source computer and user.
Tasks
Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.
Draw a diagram of the three markets for canada
: Draw a diagram of each of the three markets for Canada (a small open economy): 1- Money Market; 2 - Output Market
|
What money supply should the bank of canada set
: What money supply should the Bank of Canada set next year if it wants to keep the price level stable and real GDP has increased by 5 percent?
|
Prepare Kenoly journal entry
: Assume that at the end of the year following the impairment, the estimated recoverable amount for the patent is $130,000. Prepare Kenoly journal entry
|
How to prepare the journal entry to record the revenue
: Prepare the journal entry to record the revenue and gross profit in 2020 using the completed contract method. If no entry is required, explain why.
|
Windows hardening recommendations
: you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.
|
What amount of the payroll department cost will be allocated
: What amount of the payroll department cost will be allocated to the molding department? Madusa Company allocates costs from the payroll department
|
Compute the total amortization of discount
: On January 1, 2019, White Co. acquired Black Co. bonds with a face value of P900,000, Compute the total amortization of discount
|
What the activity rate for the designing products
: What The activity rate for the "designing products" activity cost pool is? Designing product hours, Setting up batches,Assembling products
|
Major steps in the implementation process
: List the major steps in the implementation process and describe them briefly using the diagram. Why is implementation an important subject?
|