Categories
Writers Solution

Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system

Assessment Description

Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system. Security principles such as deter, deny, delay, and detect are used to reduce attack surfaces and possible vectors. Reference the “System Hardening” CYB-515 video (located in the Class Resources) as needed to complete the lab.

Provide screenshots of each step in Part 1. On each screenshot, include 1-2 sentences that summarize what the screenshot is illustrating. For Part 2, provide screenshots of the results. All the screenshots will be used to manage network configuration and sessions to ensure port security that will harden the Windows Server.

Part 1

In the virtual sandbox environment, you will perform the steps to harden a Linux distribution by doing the following:

  • Add a Linux OS VM (Ubuntu, Kali, Parrot, or SecurityOnion).
  • On the Linux VM, open a terminal and run apt-get install lynis
  • To run Lynis, navigate to the correct directory and add ‘./’ in front of the command: ./lynis
  • Run a basic scan. This may take several minutes.
  • $ lynis audit system

Part 2

Access the Windows Server VM and perform the following hardening steps:

  • Disable automatic administrative logon to the recovery console.
  • Set a BIOS/firmware password to prevent unauthorized changes to the server startup settings.
  • Configure the device boot order to prevent unauthorized booting from alternate media.
  • Enable the Windows firewall in all profiles (domain, private, public) and configure it to block inbound traffic by default.
  • Perform port blocking at the network setting level. Perform an analysis to determine which ports need to be open and restrict access to all other ports.
  • Disable NetBIOS over TCP/IP and remove ncacn_ip_tcp.
  • Check the Windows Defender settings.
  • Configure allowable encryption types for Kerberos.
  • Do not store LAN Manager hash values.
  • Set the LAN Manager authentication level to allow only NTLMv2 and refuse LM and NTLM.
  • Remove file and print sharing from network settings. File and print sharing could allow anyone to connect to a server and access critical data without requiring a user ID or password.
  • Disable unneeded services. Most servers have the default install of the operating system, which often contains extraneous services that are not needed for the system to function and that represent a security vulnerability. Therefore, it is critical to remove all unnecessary services from the system.
  • Remove unneeded Windows components. Any unnecessary Windows components should be removed from critical systems to keep the servers in a secure state.
  • Enable the built-in Encrypting File System (EFS) with NTFS or BitLocker on Windows Server.
  • Install an open-source antivirus program of your choice
  • Run your antivirus program against your machine

Part 3

Examine the antivirus program you installed. Research potential faults and vulnerabilities within the program, including the open-source nature of the program.

Write a 750-1000-word lab report that includes a title page, table of contents, overview, and the required screenshots with summaries.

Describe the strengths and weaknesses associated with the open-source antivirus program you installed running in an enterprise network.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.  

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.  

You are not required to submit this assignment to LopesWrite.

The similitude score has to be at least 20%

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com on Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system

NO PLAGIARISM, Get impressive Grades in Your Academic Work

Categories
Writers Solution

Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system

Assessment Description

Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system. Security principles such as deter, deny, delay, and detect are used to reduce attack surfaces and possible vectors. Reference the “System Hardening” CYB-515 video (located in the Class Resources) as needed to complete the lab.

Provide screenshots of each step in Part 1. On each screenshot, include 1-2 sentences that summarize what the screenshot is illustrating. For Part 2, provide screenshots of the results. All the screenshots will be used to manage network configuration and sessions to ensure port security that will harden the Windows Server.

Part 1

In the virtual sandbox environment, you will perform the steps to harden a Linux distribution by doing the following:

  • Add a Linux OS VM (Ubuntu, Kali, Parrot, or SecurityOnion).
  • On the Linux VM, open a terminal and run apt-get install lynis
  • To run Lynis, navigate to the correct directory and add ‘./’ in front of the command: ./lynis
  • Run a basic scan. This may take several minutes.
  • $ lynis audit system

Part 2

Access the Windows Server VM and perform the following hardening steps:

  • Disable automatic administrative logon to the recovery console.
  • Set a BIOS/firmware password to prevent unauthorized changes to the server startup settings.
  • Configure the device boot order to prevent unauthorized booting from alternate media.
  • Enable the Windows firewall in all profiles (domain, private, public) and configure it to block inbound traffic by default.
  • Perform port blocking at the network setting level. Perform an analysis to determine which ports need to be open and restrict access to all other ports.
  • Disable NetBIOS over TCP/IP and remove ncacn_ip_tcp.
  • Check the Windows Defender settings.
  • Configure allowable encryption types for Kerberos.
  • Do not store LAN Manager hash values.
  • Set the LAN Manager authentication level to allow only NTLMv2 and refuse LM and NTLM.
  • Remove file and print sharing from network settings. File and print sharing could allow anyone to connect to a server and access critical data without requiring a user ID or password.
  • Disable unneeded services. Most servers have the default install of the operating system, which often contains extraneous services that are not needed for the system to function and that represent a security vulnerability. Therefore, it is critical to remove all unnecessary services from the system.
  • Remove unneeded Windows components. Any unnecessary Windows components should be removed from critical systems to keep the servers in a secure state.
  • Enable the built-in Encrypting File System (EFS) with NTFS or BitLocker on Windows Server.
  • Install an open-source antivirus program of your choice
  • Run your antivirus program against your machine

Part 3

Examine the antivirus program you installed. Research potential faults and vulnerabilities within the program, including the open-source nature of the program.

Write a 750-1000-word lab report that includes a title page, table of contents, overview, and the required screenshots with summaries.

Describe the strengths and weaknesses associated with the open-source antivirus program you installed running in an enterprise network.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.  

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.  

You are not required to submit this assignment to LopesWrite.

The similitude score has to be at least 20%

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com on Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system

NO PLAGIARISM, Get impressive Grades in Your Academic Work

Categories
Writers Solution

Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system

Assessment Description

Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system. Security principles such as deter, deny, delay, and detect are used to reduce attack surfaces and possible vectors. Reference the “System Hardening” CYB-515 video (located in the Class Resources) as needed to complete the lab.

Provide screenshots of each step in Part 1. On each screenshot, include 1-2 sentences that summarize what the screenshot is illustrating. For Part 2, provide screenshots of the results. All the screenshots will be used to manage network configuration and sessions to ensure port security that will harden the Windows Server.

Part 1

In the virtual sandbox environment, you will perform the steps to harden a Linux distribution by doing the following:

  • Add a Linux OS VM (Ubuntu, Kali, Parrot, or SecurityOnion).
  • On the Linux VM, open a terminal and run apt-get install lynis
  • To run Lynis, navigate to the correct directory and add ‘./’ in front of the command: ./lynis
  • Run a basic scan. This may take several minutes.
  • $ lynis audit system

Part 2

Access the Windows Server VM and perform the following hardening steps:

  • Disable automatic administrative logon to the recovery console.
  • Set a BIOS/firmware password to prevent unauthorized changes to the server startup settings.
  • Configure the device boot order to prevent unauthorized booting from alternate media.
  • Enable the Windows firewall in all profiles (domain, private, public) and configure it to block inbound traffic by default.
  • Perform port blocking at the network setting level. Perform an analysis to determine which ports need to be open and restrict access to all other ports.
  • Disable NetBIOS over TCP/IP and remove ncacn_ip_tcp.
  • Check the Windows Defender settings.
  • Configure allowable encryption types for Kerberos.
  • Do not store LAN Manager hash values.
  • Set the LAN Manager authentication level to allow only NTLMv2 and refuse LM and NTLM.
  • Remove file and print sharing from network settings. File and print sharing could allow anyone to connect to a server and access critical data without requiring a user ID or password.
  • Disable unneeded services. Most servers have the default install of the operating system, which often contains extraneous services that are not needed for the system to function and that represent a security vulnerability. Therefore, it is critical to remove all unnecessary services from the system.
  • Remove unneeded Windows components. Any unnecessary Windows components should be removed from critical systems to keep the servers in a secure state.
  • Enable the built-in Encrypting File System (EFS) with NTFS or BitLocker on Windows Server.
  • Install an open-source antivirus program of your choice
  • Run your antivirus program against your machine

Part 3

Examine the antivirus program you installed. Research potential faults and vulnerabilities within the program, including the open-source nature of the program.

Write a 750-1000-word lab report that includes a title page, table of contents, overview, and the required screenshots with summaries.

Describe the strengths and weaknesses associated with the open-source antivirus program you installed running in an enterprise network.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.  

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.  

You are not required to submit this assignment to LopesWrite.

The similitude score has to be at least 20%

Assignment Status: Solved By Our Experts.

WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU

WE OFFER THE BEST PAPER WRITING SERVICES on Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system

USA, AUS, CA & UK PhD Writers

Categories
Writers Solution

importance of “hardening” the PCS client workstations and servers

You provide a lecture to the working group regarding the importance of security education, awareness, and training due to the oft-quoted security maxim that users/humans are the weakest link in the security chain. While making users aware of security risks and training them how to protect company assets will reduce risk, it is important to put technical controls in place to protect the operating systems and applications that employees use every day.

Discuss the importance of “hardening” the PCS client workstations and servers. Make recommendations for operating system hardening options and describe how these are related to the concept of “system-specific policies” discussed earlier in the course. One of the working group members blurts out that antivirus protection is a waste of computing resources and patching applications takes too much time. Be sure to address these two concepts in your initial thread. Include at least one research reference and associated in-text citation using APA standards. In your replies to your peers further, discuss the importance of software security.

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service? 
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. importance of “hardening” the PCS client workstations and servers
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

importance of “hardening” the PCS client workstations and servers

You provide a lecture to the working group regarding the importance of security education, awareness, and training due to the oft-quoted security maxim that users/humans are the weakest link in the security chain. While making users aware of security risks and training them how to protect company assets will reduce risk, it is important to put technical controls in place to protect the operating systems and applications that employees use every day.

Discuss the importance of “hardening” the PCS client workstations and servers. Make recommendations for operating system hardening options and describe how these are related to the concept of “system-specific policies” discussed earlier in the course. One of the working group members blurts out that antivirus protection is a waste of computing resources and patching applications takes too much time. Be sure to address these two concepts in your initial thread. Include at least one research reference and associated in-text citation using APA standards. In your replies to your peers further, discuss the importance of software security

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?  film dealing with the march on Washington on August 28, 1963
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. importance of “hardening” the PCS client workstations and servers
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays