Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Risks threats and vulnerabilities commonly found in the workstation domain

13/10/2021 Client: muhammad11 Deadline: 2 Day

Casestudy

Requirement:

Please complete the Lab 6, 7,8 & 9 available on the Module 8 home page
Include at least 5 peer-reviewed sources properly cited and referenced and your course textbook.

Writing Requirements

8 pages in length (excluding cover page, abstract, and reference list)
5 peer-reviewed sources
APA format, Use the APA template located in the Student Resource Center to complete the assignment.
Please use the Case Study Guide as a reference point for writing your case study.

50 LAB #6 | Auditing the Workstation Domain for Compliance

Lab #6 - Assessment Worksheet

Auditing the Workstation Domain for Compliance Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________

Overview

In this lab, you learned to recognize the risks, threats, and vulnerabilities commonly found in the Workstation Domain, you identified known vulnerabilities and exploits on the Common Vulnerabilities & Exposures (CVE) database listing, you described how risks, threats, and vulnerabilities or misconfigurations at the operating system level in the Workstation Domain might expose that workstation, and you identified steps to harden the Workstation Domain operating system and applications installed on the user’s workstation for compliance and safeguarding of sensitive data and access to that data. Finally, you applied Department of Defense (DoD) guidelines for securing the Workstation Domain, including the review and assessment of Windows 7 and Windows 2008 security guidelines.

Lab Assessment Questions & Answers

1. What are some risks, threats, and vulnerabilities commonly found in the Workstation Domain that must be mitigated through a layered security strategy?

2. File-sharing utilities and client-to-client communication applications can provide the capability to share files with other users (for instance, peer-to-peer networking or sharing). What risks and/or vulnerabilities are introduced with these applications?

3. Explain how confidentiality can be achieved in the Workstation Domain with security controls and security countermeasures.

51

Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual

4. Explain how data integrity can be achieved in the Workstation Domain with security controls and security countermeasures.

5. Explain how availability can be achieved in the Workstation Domain with security controls and security countermeasures.

6. Although users of desktop applications might not create mission-critical data, all of their data represents a resource that, if lost, can result in a permanent loss of information or productivity. Explain what countermeasures and best practices should be implemented to avoid this potential disaster.

7. What is the purpose of the Microsoft® Windows Security Configuration and Analysis snap-in? Explain.

8. How would you go about updating the Windows Security Options File? Explain how this option can help mitigate risk in the Workstation Domain.

9. What does the Microsoft® Windows executable GPResult.exe do and what general information does it provide? Explain how this application helps mitigate the risks, threats, and vulnerabilities commonly found in the Workstation Domain.

10. What is the risk involved in caching logon credentials on a Microsoft® Windows system?

11. What is the current URL for the location of the DISA Military STIGs on Microsoft® Windows 7

operating systems?

52 LAB #6 | Auditing the Workstation Domain for Compliance

12. Within the Windows 7 Security Technical Implementation Guide (STIG), what are the three Vulnerability Severity Code Definitions defined?

13. DumpSec is a tool used by system administrators performing information assurance on a

Microsoft® Windows 7 workstation. What is the purpose of this tool?

14. From the Windows 7 Security Technical Implementation Guide (STIG), where can Windows 7 File & Registry Settings be reviewed and audited on a Windows 7 workstation?

15. As per DoD and information assurance procedures, who must be notified if any exceptions to DoD STIGs standards for workstation configurations are to be implemented?

Course Name and Number:
Student Name:
Instructor Name:
Lab Due Date:
Question1:
Question2:
Question3:
Question4:
Question6:
Question7:
Question8:
Question9:
Question10:
Question11:
Question5:
Question12:
Question13:
Question14:
Question15:

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Academic Master
Assignment Guru
Financial Hub
ECFX Market
Quick Finance Master
Homework Master
Writer Writer Name Offer Chat
Academic Master

ONLINE

Academic Master

Give me a chance, i will do this with my best efforts

$35 Chat With Writer
Assignment Guru

ONLINE

Assignment Guru

I have read your project details. I can do this within your deadline.

$20 Chat With Writer
Financial Hub

ONLINE

Financial Hub

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$49 Chat With Writer
ECFX Market

ONLINE

ECFX Market

Give me a chance, i will do this with my best efforts

$44 Chat With Writer
Quick Finance Master

ONLINE

Quick Finance Master

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$24 Chat With Writer
Homework Master

ONLINE

Homework Master

I will cover all the points which you have mentioned in your project details.

$49 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

How to make a parachute out of a grocery bag - Jamie reid never mind the bollocks album cover - Negotiation story - Psychiatric case files - Twenty one pilots car - Deca virtual business challenge cheats - Being an outsider essay - Carl rogers encouraged therapists to foster client growth by exhibiting - Barbell overhead press athlean x - Community Nutrition Poster - Change selected cell to 20pt in excel - N 5 what is the value of n - Business process in sap fico - Dr kai nalder dentist - Seidel's guide to physical examination an interprofessional approach 9th ed - Information Governance - Scheme of work example - Rising sun movies mareeba - Clark rubber traralgon vic - Homework market become a tutor - Honey fungus resistant trees - Frontline young and restless in china - Gemmological association of australia - Shammi prasad brother's names - Use the following data to calculate the current ratio - How to draw a genogram in microsoft word - The darkling thrush mcq questions - When is my baby due - How to reference aasb harvard - Make Corrections to 3 assignment that include Summaries and Diagrams - How to draw a cube on paper - App driven orchestration in oic - Louann gypsy wedding weight loss - Dataflux data management studio download - Angelantoni life science srl - Why read shakespeare by michael mack - U.S HISTORY BOOK REVIEW - How to write a fraction story - Barbara bright is the purchasing agent for west - Pasco electric field mapping lab - How to get rid of ln in algebra - Unit 2 macroeconomics lesson 3 activity 15 - Adding scalar multiples of vectors graphically mastering physics - Outcome 3 children have a strong sense of wellbeing - Http www mplans com sample_marketing_plans php - A0 dimensions in cm - Principle cleaning services address - French bulldog club of nsw - Difference between relativism and universalism - Umuc effective writing center - Gdp per capita 2017 usa - Us magazines by circulation - A box contains 20 fuses of which 5 are defective - List the stages of family life cycle - Pore size distribution bjh - Data modelling and analysis - Just walk on by brent staples thesis statement - In situ pile foundation - Express your answer numerically as an integer - History of corrugated iron in australia - PTSD - Altruism in society campaign and presentation - Resonance and standing waves physics lab answers - The tires of a car make revolutions - Vernier caliper parts name - Xe 4f14 5d10 6s1 - First state bank macomb il - Structural strain theory of social movement - Marketing an introduction 13th edition citation - Zpd to lexile conversion chart - Academic integrity essay - Warco 2b12 pillar drill - What is the main theme of julius caesar - Nib ambulance cover nsw - SECURITY ARCHITECTURE AND DESIGN (ISOL-536-M31) PHD IN IT - Abercrombie and fitch case study analysis - Propylene is hydrogenated in a batch reactor - Who won the battle of hastings - Pcdna 3.1 v5 his topo ta expression kit - Ethics, Law and Cybersecurity - C++ program to reverse a string using pointers - Elimination Complexities - The pinewood furniture company produces chairs - Mission mxb dagger crossbow for sale - Assignment 9 - June 2007 maths a level mark scheme - Which of the following best describes performance based logistics contracts - Is everyone really equal second edition - Discussion Questions - English - Is li-f polar covalent - Elderly women should consume ______ milliliters of water per day - Crisis intervention strategies 8th edition ebook - O full of scorpions is my mind dear wife analysis - Order 2211125: Research Methods - Confirmation of enrolment unimelb - Cost of Capital - Project management simulation scope resources and schedule - Ethical hacking vs penetration testing - Zero order first order second order graphs