Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Hardening Techniques Responses

26/09/2020 Client: sarahhitz Deadline: 10 Days

Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that's discusses the responses. 100% original work and not plagiarized. Must meet deadline.


RESPONSE 1:


This week we are discussing hardening techniques for user workstations. First, what is hardening? Hardening is the reduction of threat to a server, infrastructure, workstation or the like. The purpose of hardening is the same concept as securing just about anything. An administrator will look through the entire systems taking applications, servers, networks, and the likes into account. Checking each for vulnerabilities and closing the small cracks that can be exploited in a malicious attack. Techniques that are used to harden a work station with a windows operating system are as follows:


Secure installations – it all starts from the install of the operating system. If you begin with a device that has malicious software on it than your security measures have already failed.


Remove unwanted programs – Basically, clean up. The more programs that you have, the more avenues are available for attack and the more areas you have to secure.


Use encryption – this seems like a no brainer. All vital information should be encrypted.


Keep up to date with patches and updates – As we spoke about in a previous forum, you have to be careful with your updates and patches, but falling to far behind can leave you vulnerable to attack.


Enable the guards – Windows has built in hardening tools such as, device guard, credential guard, application guard, and exploit guard. These should be utilized as an extra measure. The more layers an attack has to get through, the less likely they are to continue attacking.


Utilize Windows Defender – although this should be turned on by default it is good to check and make sure your hardening layers are in place.


Use multi-factor authentications – these are heavily utilized today, they can be pins, biometric (fingerprints), passwords, or even device verification.


Gets ransomware protection software – Another semi-obvious one, most systems should have ransomware protection is they are to be thought of as secure.


Jesse


RESPONSE 2:


When it comes to hardening workstations, I remember at my last organization hearing about Security Technical Implementation Guides (STIGs) for the very first time. I knew that patching on routine bases was necessary, and also to ensure our Anti-virus and its components were always at the DoD mandated versions but, I had never heard of STIGs. The National Institute of Standards and Technology (NIST) publishes Windows 10 STIGs in wich DoD Information Systems implement on their networks to harden their systems. The STIGS aren’t just for the computer systems themselves; they also cover settings for “browsers, Antivirus, and other desktop applications.” For DoD systems, certain STIGS are mandatory and must be in place to meet DISA and other accreditation standards. 


The Windows 10 STIG website lists findings that are listed by severity, and they are CAT I (High), CAT II (MED), and CAT III (Low). The site will provide the finding ID along with a description of the finding. The ID is hyperlinked to a page that includes additional information, provides the fix action. If you like to see an example, here are the links to the STIG viewer, followed by a STIG Finding. The CAT I findings are the most critical to fix, as they are vulnerabilities on your system. One way to check to see what STIGS are still outstanding is by using the Security Content Automation Protocol (SCAP) Tool. This tool can be installed on a system and will check for the system’s compliance. This tool came in handy for my team, as when we were introduced to STIGS, they came in a big fat ugly binder. There was no easy way to parse through that much paperwork. Utilizing the SCAP tool, we were able to capture the current state of our systems and come up with a game plan on which STIGS to attack first.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Grade Tutor
Ideas & Innovations
Study Master
Top Academic Guru
Financial Hub
Instant Assignments
Writer Writer Name Offer Chat
Top Grade Tutor

ONLINE

Top Grade Tutor

I am highly qualified expert, working from 2008-9 in this industry. I have all relevant skills and expertise related to your project. To ensure my potential must visit my profile to check my ratings and uploaded samples. Thanks :--)

$110 Chat With Writer
Ideas & Innovations

ONLINE

Ideas & Innovations

Hi, Hope you are doing well. I can do this easily because I have several experiences to write articles on different web sites, creative content for several blogs & also SEO writing. Even I have written many kindle ebooks, Being a creative writer, I think I am the most eligible person for your Ghostwriting project. So lets make no longer delay & start chatting immediately.

$130 Chat With Writer
Study Master

ONLINE

Study Master

I am highly qualified expert, working from 2008-9 in this industry. I have all relevant skills and expertise related to your project.

$105 Chat With Writer
Top Academic Guru

ONLINE

Top Academic Guru

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$105 Chat With Writer
Financial Hub

ONLINE

Financial Hub

I feel, I am the best option for you to fulfill this project with 100% perfection. I am working in this industry since 2014 and I have served more than 1200 clients with a full amount of satisfaction.

$125 Chat With Writer
Instant Assignments

ONLINE

Instant Assignments

I feel, I am the best option for you to fulfill this project with 100% perfection. I am working in this industry since 2014 and I have served more than 1200 clients with a full amount of satisfaction.

$125 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Tomorrow tomorrow tomorrow speech macbeth analysis - The hotel paris case study - Mod Meters Case Study - Term paper - Javascript get frame by name - Culture and Conflict Style - The open boat quiz - Heriot watt campus map - Managing Group Policy within the Microsoft Windows Environment - Anecdotal comments for students - Https mycampus phoenix edu login asp - Gnosis fetal assessment and monitoring answers - Theoretical Literature Review Topic - What types of legal claims could Paula make against Cash Mart and Geoffrey? - Abercrombie and fitch diversity issues - Discussion and assignment - Rolls royce marine ålesund - What is a windshield survey - A marketing case study on nike - Is saltwater a conductor or insulator - Truth table for gated sr latch - Nintendo competitive advantage - R Homework 2 - Project - The knares gp surgery - Middle school team leader job description - Mental health community - Racq roadside assistance options - Media relations cover letter - Wilmot proviso definition apush - 【(+97•15-2•730-•5642) Abortion Pills in Dubai|Abu Dhabi|Alain|Sharjah|RAK city|(Surgical Abortion in UAE)-mifepristone200mg & Misoprostol 200mcg Available in Dubai|Abu Dhabi-ipills in Dubai & Cost of Cytotec in Dubai| Abu Dhabi. - Al baik wikipedia - Spray tan consultation form - Pqr is what type of polynomial - Sales return process flowchart - When did khadija died - Contouring is a very dangerous game - MGT312T Week 4 Discussion - Theory of mind test - Dsdm demands higher level of documentation - Kipling and i by jesus colon summary - Kramer and knox began a partnership by investing - Sexual reproduction increases genetic variability through - Cable tray on roof - If x is binomial with n = 5 and p = 0.05, the chance that x is at least 1 is 0.6240 - Security Architecture and Design - Windows live movie maker timeline mode - If a firm increases its plowback ratio, this will probably result in _______ p/e ratio. - Why uniforms should not be banned - Module 4 Journal Article Analysis - Millivolt drop test formula - Nissan case study milestone 2 - Strategy and games dutta pdf - Facts on the pledge of allegiance - Quiet leadership david rock free download - Bmj open instructions for authors - PSA - Software development plan outline - Rules for assigning oxidation states - Too full of the milk of human kindness metaphor - A 10 year bond pays an annual coupon - The outsiders chapter 4 audio - Christology from Above or Below? - Papi lights full form - Due Sunday by 3.00 pm - Carlie c iga meat bundle prices - 300 words - Peel hall medical centre - Time value of money problems with solutions - Hp elitedisplay e231 vs hp compaq la2306x - Recognise and utilise diverse perspectives - Dove owl peacock eagle descriptions - Evidence-Based Practice and the Quadruple Aim:Where in the World Is Evidence-Based Practice? - Brilliant answers practical - All over the counter receipts are entered in cash registers - Nissan case study milestone 2 - Mgmt 1 - 1 page summary - Simon company income statement - Discussion boards - Conceptual framework of strategic cost management - Project - Pestle and swot ananlysis - Cost accounting case studies with solutions - Portals and Banner Ads - The tools of fiscal policy answers - Regional Economic Integration - Plato's allegory of the cave ted talk - Electron configuration of manganese - Ferrero rocher case study - Why was heck worried about the old sarum bunch - Brandon brown versus yucatan chapter 4 - Want a case study asap - Walsh company manufactures and sells one product - Miami Dade College PSY1515 - Deskjet 2510 all in one series - Imogene king theory of goal attainment - Brisbane city council dump - High heat capacity definition biology - Tafe sa youth work