Part A Benchmark - Host Hardening Protecting the host through the process of hardening is a key skill. 1. Develop a plan for hardening for the Windows VM that you created in the last assignment. 2....

1 answer below »









Part A


Benchmark - Host Hardening



Protecting the host through the process of hardening is a key skill.


1. Develop a plan for hardening for the Windows VM that you created in the last assignment.


2. Include at least seven host hardening techniques as discussed in the textbook's chapter. Identify the type of control that you are implementing.


3. Implement the plan.


4. As you go, take instructional notes and screenshots that will help to reproduce your process. Refer to the "Report Template," located within the course materials.


APA style is not required, but solid academic writing is expected.


This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.





Benchmark Information



This assignment benchmarks the following programmatic competency:



BS Computer Programming



1.4: Minimize systems risks, threats, and

vulnarabilites
using best practices of secure programming.
















PART B


Client-Side Attacks



Anti-malware is the first line of defense. It is extremely important to perform regular scans and interpret the results.


1. Using GCU Virtualization Solutions, create a Microsoft Windows based Virtual Machine (VM.)


2. Install a popular anti-malware package on the virtual machine.


3. Perform a full scan of your Windows VM.


4. Disable the Windows Firewall.


5. Leave the virtual machine connected to the Internet for 24 hours or more.


6. Perform a second full scan. Document the differences.


7. As you go, take instructional notes and screenshots that will help to reproduce your process. Refer to the "Report Template," located within the course materials.


8. Sub-activity: If your scans do not detect any vulnerabilities or malware on the VM, then review your chosen anti-malware website for known/current vulnerabilities.


In 250-500 words, describe the basic secure design fundamentals that will create a trusted computing platform.


APA style is not required, but solid academic writing is expected.




This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.








Answered Same DayJun 29, 2021

Answer To: Part A Benchmark - Host Hardening Protecting the host through the process of hardening is a key...

Pranav answered on Jul 02 2021
135 Votes
Resource
    
ITT-307 Lab Assessment Report Template
Professor:            {Enter Professors Name}
Course:            {Enter Course Number, Title, and Section}
Student:            {Enter Your Name}
Date:            {Enter Date}
Title:        {Enter Title for this Assignment}
Directions:
Overview In this assignment we have explained the VM functionality and all the
measures related to cyber thread Also the Part A will demonstrate hardening functional and Part B will demonstrate all the VM concepts also the Trusted computing system.
PART-A
Ans 1. PLAN OF HARDENING
Hardening of the OS is the fulfilment of compose of an Operating system securely, updating it, creating policy & policy to good thing govern the system in a good manner and separate unnecessary requests and services. This is produced to miscalculate OS showing warning and risk. Even though it is unworkable to slash imperil to zero.
Ans 2. HOST HARDENING TECHNIQUES
1 characterize a host.
A congregation is any badge that has an IP address.
2Why is crowd hardening compulsory?
Host hardening is compulsory for the reason that generally hosts, at what time in commission by system defaults are exact cool to breach.
3 What are the main groups of hosts?
The groups of hosts are server, client (mobile phones are also included), router, switch, and firewall.
4 What are the fundamentals of mass hardening?
The fundamentals are:
- rear up the horde frequently.
- limit animal admittance to the host.
- instate the OS with self-confident configuration options.
- diminish the quantity of applications and OS air force in succession on the host.
- Harden each and every one enduring applications on the host.
- curb patches up to date.
- get along users and groups.
- supervise read permissions for individual’s users and groups.
- Encrypt records if possible.
- put in a crowd firewall.
- interpret OS kindling regularly.
- dart exposure tests against the system regularly.
5 Why is it chief to reinstate defaulting passwords during configuration?
It is influential to trade failure to change passwords during configuration as duck passwords are effortless to come across up and foul language by attackers.
6 What is a safety baseline and why is it necessary?
A guarantee baseline is an unyielding of limited measures to be full to harden hosts of a precise letters and meticulous versions in that type.
Security baselines are imperative for the reason that they ready a benchmark baseline to which completely units will satisfy.
7 Why downloading of floppy disk description in service system looked-for compared to configuring every horde individually?
Using floppy disk descriptions of the OS as contrasting to special configuration is preferable as it saves cash on installation and ensure that the baselines are met finally with all install.
8 What is virtualization?
Virtualization is while numerous uses of systems are adept to direct non-governmentally on a lone substantial machine.
9.What are round about of the recompense of virtual machines?
There is countless remuneration from virtual machines. Virtual tackle is greatly earlier to arrangement up and configure, as they're cloned from server with it possess protection baseline. This makes a new lock up environment and reduce lack of consistency.
It reduces employment costs that...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here