Question

Complete the hardening and auditing tasks using a personal computer with the default installation of Windows...

Complete the hardening and auditing tasks using a personal computer with the default installation of Windows 7 or Windows 10. Provide screenshots of all screens and queries made.

Ensure that you are logged in as an administrator. Using a computer that has Windows 7 or Windows 10 installed:

Review the antivirus program. Ensure that it is up to date, is configured for automatic updates, and is scheduled to run quick scans regularly. Note when the last full system scan was run and any issues you observe with the software.

Configure audit logging to identify all failed password attempts into the system.

After at least 24 hours, check the Windows workstation for security events. Be sure to review the audit log in Windows Event Viewer.

Explain how you ensured the antivirus program is up to date, scheduled to run regular quick scans, and when the last full system scan was run. Describe anything significant you observed.

Explain how you configured audit logging to record all failed password attempts into the system.

Describe all the potentially problematic security events that occurred in the 24-hour period after checking the antivirus software and configuring audit logging.

Explain what was done (or should be done) to correct any problems encountered.

Explain the purposes of system hardening and auditing in terms of the company’s goal of maintaining information systems security. Also describe an additional area of concern or an emerging trend related to information systems security that you think warrants the company’s attention in the immediate future.

Briefly explain how your work on this project relates to your responsibility to help the company achieve its IT security goals.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Windows is one of the most used operating system in the world and hence, it is the most vulnerable one as many of the exploits and hacking tools are targetted for Windows user. The services in Windows has improved far. The tools that are replacing the use of antivirus for windows are as follows:

  • Windows Defender
  • Windows Firewall

Antivirus:

The antivirus are just the casuality. Some of the antivirus are not to their fullest and there are many ways to bypass the antivirus. Hence, using them is nothing but waste of time unless and until they are quite productive.

Bounty Program:

  1. This technique has decreased the hacking scenarios and has increased the awareness towards cybersecurity.Today, we are going to talk about the recent vulnerability that was been disclosed in the Windows systems.
  2. Vulnerabilities are been capturing the world's security and making us all vulnerable to the tricks that are been played upon us by the exploiters. Hence, need of the ethical hackers is been increasing. Below is the description of how can we secure networks.

Network Monitoring Using Security:

The Traffic monitoring is also an important concept as it can be used to increase the chances of being vulnerable as much time it takes to get less traffic. As, chances of being exploited with attacks such as DoS & DDoS attacks. The networking of the whole system is being done mostly on Linux so understanding Linux to attend the traffic in the system with full proof of vulnerability.

Windows Vulnerability:

  • The vulnerability was very severe and consists of the programming issue in the ELF files in windows kernel while the kernel loads.
  • The exploiters had written an malicious program known as Position Independent Executable(PIE) which was able to exploit the loader and will be able to map the rest of the part of the Application's data segments which was been registered over the memory area and was reserved for the stack.
  • This completely resulted in the memory corruption and was then possible to get the local privilige escalations.
  • The flaw was completely representing the possible mechanism for any exploiter or hacker to put up a normal user as root and then acquire the control over the system easily.
  • The patch of the vulnerability was given away recently past two days and the sysadmins were advised to patch the systems for prevention of more hacks.

Hence, this is how the windows security is exploited and with the help of the possible exploits and pitfalls in the system there are many hacks happening in the systems with Windows.

Exploiting The Vulnerabilities:

In Windows, there are penetration tester softwares that test the vulnerabilities and make the world aware of the security issues that are contained in the systems. The system will then get to know about the cyber security and getting into the facts of the applications is also very important.

The vulnerabilities that are pretty much available in the Internet and are exploited are as follows:

  • Remote Code Execution (RCE)
  • Phishing
  • XSS Attacks
  • SQL Injections
  • DoS & DDoS Attacks

Hence, these are the vulnerabilities that are being indentified on the bigger scale in the market and are being exploited by many security professionals and hackers.

Methodologies:

The impact of the vulnerabilities on the organization may be very intense if not focused on. To keep the network running and fine we need to overcome these vulnerabilities and create patches for these vulnerabilities otherwise the impact of these vulnerabilities will be very immense.

  • The network if contains any of these vulnerabilities and if not focused on removing the vulnerability it can be exploited by anybody resulting in decrease in the privacy.
  • It will also result in getting the security of the network in trouble and can be compromised by anyone anytime.

Hence, these are the impacts of the vulnerabilities and how must one deal with these vulnerabilities.

Rate an upvote....Thankyou

Hope this helps......

Add a comment
Know the answer?
Add Answer to:
Complete the hardening and auditing tasks using a personal computer with the default installation of Windows...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Fullsoft’s chief technology officer (CTO) established a plan to mitigate risks, threats, and vulnerabilities. As part...

    Fullsoft’s chief technology officer (CTO) established a plan to mitigate risks, threats, and vulnerabilities. As part of the mitigation plan, you and your team members will establish baseline security controls on all workstations (harden the systems), which run either Windows 7 or Windows 10. For this effort, you will ensure that the antivirus software is running properly and implement a control related to password hacking attempts. The CTO also requests a report on the work would perform, part of which...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • 1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80...

    1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT iptables -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT Allow web server traffic Block web server traffic Force port 80 traffic to port 443 Allow traffic from both 80 and 443 using UDP protocols 2. Timestamps are important because can not be changed or deleted by attackers when configured properly, allows you to correlate events across the network can always...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • Question 3                Understanding and Assessing Control Risks                  (Total 20

    Question 3                Understanding and Assessing Control Risks                  (Total 20 marks) Assessing Control Risks Quality Furniture NZ Ltd revealed the following through the enquiries and observations associated with understanding internal controls. The managing director Michael Jones has always placed a premium on the values of integrity and ethics. For years, business has been conducted on a handshake, and commitments made by the company were always honoured. Integrity and ethics are also valued in employees, and this quality has been evidenced in...

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Option 1: Authentication System For security-minded professionals, it is important that only the appropriate people gain...

    Option 1: Authentication System For security-minded professionals, it is important that only the appropriate people gain access to data in a computer system. This is called authentication. Once users gain entry, it is also important that they only see data related to their role in a computer system. This is called authorization. For the zoo, you will develop an authentication system that manages both authentication and authorization. You have been given a credentials file that contains credential information for authorized...

  • CASE STUDY U.S. Office of Personnel Management Data Breach: No Routine Hack The U.S. Office of...

    CASE STUDY U.S. Office of Personnel Management Data Breach: No Routine Hack The U.S. Office of Personnel Management (OPM) is conducted, may have been extracted. Government offi responsible for recruiting and retaining a world-class cials say that the exposure of security clearance irn workforce to serve the American people and is also mation could pose a problem for years responsible for background investigations on pro- spective employees and security clearances. In June the OPM system, and its records were protected...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT