Question

Fullsoft’s chief technology officer (CTO) established a plan to mitigate risks, threats, and vulnerabilities. As part...

Fullsoft’s chief technology officer (CTO) established a plan to mitigate risks, threats, and vulnerabilities. As part of the mitigation plan, you and your team members will establish baseline security controls on all workstations (harden the systems), which run either Windows 7 or Windows 10. For this effort, you will ensure that the antivirus software is running properly and implement a control related to password hacking attempts.

The CTO also requests a report on the work would perform, part of which will be incorporated into the company's IT security policy procedures. The report should also include the purposes of system hardening and auditing, and an additional area of concern or emerging trend related to information systems security that's relevant to Fullsoft.

At the end of the report, include a brief statement that explains how your work on this project relates to the larger responsibility you have for supporting the company’s success regarding IT security. Your statement will be considered a part of your upcoming performance review.

Tasks

Write a report in which you:

  • Describe the evaluation process for selecting an antivirus product for the client workstations.

  • Detail how the antivirus software would be updated and monitored.

  • Explain how system logging could be leveraged to control and monitor password hacking attempts.

  • Describe key problematic security events that could occur on the client workstations and how they could be mitigated.

  • Explain the purposes of system hardening and auditing in terms of the company’s goal of maintaining information systems security. Also describe an additional area of concern or an emerging trend related to information systems security that you think warrants the company’s attention in the immediate future.

  • Explain what was done (or should be done) to correct any problems encountered.

  • Briefly explain how your work on this project relates to your responsibility to help the company achieve its IT security goals.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer: Windows Security: Windows is a widley used operating Systems world wide so that there Are More Vulurrabilitics whileSecurity events Alter Baseline Security cowliquration: when the Baseline Security configuration is performed on the window sy5 All windows systems Con Connect to each other defined group policy and not communiste outside the group 6) Antivirus identi

Add a comment
Know the answer?
Add Answer to:
Fullsoft’s chief technology officer (CTO) established a plan to mitigate risks, threats, and vulnerabilities. As part...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Complete the hardening and auditing tasks using a personal computer with the default installation of Windows...

    Complete the hardening and auditing tasks using a personal computer with the default installation of Windows 7 or Windows 10. Provide screenshots of all screens and queries made. Ensure that you are logged in as an administrator. Using a computer that has Windows 7 or Windows 10 installed: Review the antivirus program. Ensure that it is up to date, is configured for automatic updates, and is scheduled to run quick scans regularly. Note when the last full system scan was...

  • WRITTEN ASSIGNMENT (CASE STUDY) DESCRIPTION AND RUBRIC Scenario You are the Chief Executive Officer [CEO] of...

    WRITTEN ASSIGNMENT (CASE STUDY) DESCRIPTION AND RUBRIC Scenario You are the Chief Executive Officer [CEO] of a health services organization. This organization has inpatient and outpatient facilities, home healthcare services, and other services that meet your patient population’s needs. It also has a world-renowned AIDS treatment center. The organization has always enjoyed an excellent reputation and its quality of care is known to be excellent.   Unfortunately, your organization has recently been featured in every media vehicle known to man. The...

  • Each student will conduct an in-depth case study analysis of an Information Technology Project summarized in...

    Each student will conduct an in-depth case study analysis of an Information Technology Project summarized in a professional-grade project report. You will need to contact someone in an organization who has worked on or is currently working on an IT project. This could be the project manager, a member of the project team, or the project client or sponsor. This may be a project with which you were involved; however, you must include at least one other person in order...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • MGMT SS STATS, an umbrella body that facilitates and serves various Social Security Organizations...

    MGMT SS STATS, an umbrella body that facilitates and serves various Social Security Organizations/Departments within the Caribbean territories, stood poised to meet the needs of its stakeholders by launching an online database, located at www.SSDCI.gov. The database will provide members and the public with access to the full set of services that can (also) be initiated face to face; and it will provide managed, private, secure access to a repository of public and/or personal information. For example, insured persons accumulate...

  • Alpine Perceptions Ltd. Alpine Perceptions Ltd. (APL) provides “technology solutions” to manufacturing companies. APL is a...

    Alpine Perceptions Ltd. Alpine Perceptions Ltd. (APL) provides “technology solutions” to manufacturing companies. APL is a wholly owned subsidiary of Elevation Technologies Inc. (Elevation), a privately owned conglomerate. In 2016 APL was performing poorly and Elevation considered selling the company for the best offer. As a last resort Elevation hired turnaround specialist Kendal Wilson to more effectively manage and salvage APL. Ms. Wilson’s employment contract specifies that in addition to an annual salary she would receive a $1 million cash...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • Which of the six risks should be considered a significant​ risk? Explain why they represent a...

    Which of the six risks should be considered a significant​ risk? Explain why they represent a significant risk. For each risk that you identified as a significant​ risk, describe how you might address the risk to give it special audit consideration. For​ example, a valuation risk might be addressed by engaging a valuation specialist. Begin by determining which of the six risks should be considered a significant risk.​ Then, for each risk that has been identified as a significant​ risk,...

  • CASE STUDY U.S. Office of Personnel Management Data Breach: No Routine Hack The U.S. Office of...

    CASE STUDY U.S. Office of Personnel Management Data Breach: No Routine Hack The U.S. Office of Personnel Management (OPM) is conducted, may have been extracted. Government offi responsible for recruiting and retaining a world-class cials say that the exposure of security clearance irn workforce to serve the American people and is also mation could pose a problem for years responsible for background investigations on pro- spective employees and security clearances. In June the OPM system, and its records were protected...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT