Question

Discuss how you would harden a system and whose responsibility it would be to do this...

Discuss how you would harden a system and whose responsibility it would be to do this task. Is there an issue if this task is not assigned? What is important about a baseline? Why do you need one? How do you capture a proper baseline? Discuss any issues that have come up when a proper baseline wasn't captured. Explain the importance of inventory management when it comes to computer hardware and how this may help with administration of servers. What are the benefits and problems with managing this inventory? Type the answer please so i can read it . Thanks

0 0
Add a comment Improve this question Transcribed image text
Answer #1

If you have any doubts please comment below.Please give upvote if you like this.

Explanation:

The given question contains two different questions,one of them discusses the system hardening and the other is about the inventory management. For each of these questions, there are several sub parts. Refer to the below explanation clearly for both questions.

  1. System hardening is a collection of tools, techniques, and best practises to reduce vulnerabilities in technology applications, systems, infrastructure, firmware and other areas. The goal is to reduce security risk by eliminating potential attack vectors and condensing the systems attack surface.

There are several types of system hardening activities such as :-

a) Application hardening

b) Operating system hardening

c) Server hardening

d) Database hardening

e) Network hardening

Steps to harden a system:

  • Auditing the existing systems(Using penetration , testing, vulnerability scanning and so on)
  • Create a strategy for systems hardening
  • Path vulnerability immediately i.e. automated and comprehensive vulnerability identification and patching system
  • Network hardening by ensuring that firewall is properly configured and all rules are regularly audited, secure remote access points, block open network parts.
  • Server hardening by hardening system before connecting to external servers, avoid installing unnecessary software on computers.
  • Eliminating unnecessary accounts and privileges
  • Operating system hardening by applying os updates, dervice packs, remove unnecessary drives, etc
  1. It is the responsibility of manager to harden it's system, thus the MSP i.e managed service providers must strengthen client defenses against outside attacks.
  2. Yes, it's an damaging issue if no steps are takes for system hardening. This is because no system hardening may lead to decreased system functionality decreased in security significantly and complex auditability and compliance.
  3. A hardening process establishes a baseline of system functionality and security. This is because, inorder to recognize abnormal system behaviour as a sign of attack one needs to know what is normal behaviour. Thus, this is the security baseline.
  4. If a proper baseline wasn't captured then the system won't be able to differentiate between an attack and normal behaviour . Thus , baseline helps us to harden the system by providing means to security.
  5. Inventory management for computer hardware which involves numerous types such as client pc's servers printers and other peripherals is very crucial for an organization. It involves various aspects such as keeping upto date information about assets, including location client assignment purchase history warranty info, configurations and so, morever, hardware inventory management dares time and helps focus on computer/ IT tasks.
  6. In short, computer hardware inventory management lets discover and manage hardware devices in network of an organization, automate hardware assest management, keep hardware inventory up to date and save valuable time.
  7. This inventory management also help to monitor server inventory, fring under control and keep it well organised. Organization can monitor server inventory changes. Perform patch management, automate auditing process, critical security control and compare different system environment.
  8. The advantages of inventory management system for computer hardware are discussed above. The various challenges are the hardware inventory challenges such as maintaining accurate inventory for wide range of devices pc's, mobiles, servers , data centers etc... Other than this there are numerous organizational challenges.  
Add a comment
Know the answer?
Add Answer to:
Discuss how you would harden a system and whose responsibility it would be to do this...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Do you think that a company's system and network should only be the responsibility of the...

    Do you think that a company's system and network should only be the responsibility of the network administration or should every staff member know the basics when it comes to operating the system/network?

  • Respond to the following in a minimum of 175 words: Discuss how you would set up...

    Respond to the following in a minimum of 175 words: Discuss how you would set up control measures in your organization or even your home? What considerations must you include in your risk analysis? How do those differ when analyzing risk for hardware, software, and cloud services?

  • Discuss How would you see yourself when you are older and what are your expections are...

    Discuss How would you see yourself when you are older and what are your expections are if and or when you need placement in a skilled nursing center. Do some research sbout nursing homes looked like in the past, present, and what they look like in the future. How do you see yourself living there?

  • Discuss what you would do to make the IRS more efficient and how to help avoid...

    Discuss what you would do to make the IRS more efficient and how to help avoid possible penalties regarding tax problems.

  • read the paragraph provided , base on the laws of giving informed consent...Discuss what you would...

    read the paragraph provided , base on the laws of giving informed consent...Discuss what you would do if you were Jennifer? 2-7: Informed Consent Registered Nurse Jennifer works with Dr. Jones in a gastroenterology clinic. Primary care phy- sicians in the area often refer their patients to one of the gastroenterologists at the clinic when a patient needs a colonoscopy. Prior to the day of their procedure, patients are told to come to the clinic to obtain their colonos- copy...

  • Pick a purchase you have made or considered making recently that you would classify has extensive...

    Pick a purchase you have made or considered making recently that you would classify has extensive (vs. limited or routine). Go through the steps you took in the decision making process, and be detailed. what was the problem/need your information search your evaluation of alternatives your decision your post-decision evaluation Based upon your decision process, how would you classify yourself in terms of segmentation variables? What about you led to the choice you made for this process? Please describe yourself,...

  • Can you write both answers by your word with the same idea 4. Discuss the reasons...

    Can you write both answers by your word with the same idea 4. Discuss the reasons why professional caregivers may experience stress in caring for the dyingDiscuss how caregivers can decrease this stress. Caregivers, who work in hospice areas, always want to do the right thing. The caregiver is the one the family relies on most. Most patients that come into hospice die at some point. Caregivers have the constant goodbyes of all of their patients. Caregivers have to come...

  • A QUESTION OF ETHICS t WHAT WOULD YOU DO? Janeen always disliked talking on the telephone-she...

    A QUESTION OF ETHICS t WHAT WOULD YOU DO? Janeen always disliked talking on the telephone-she thought that it was an impersonal form of communication . Thus college was a wonderful respite, because, when her friends would call her, instead of staying on the phone, she could quickly run over to their dorm or meet them at the campus coffeehouse. One day, during a reading period before exams, Janeen received a phone call from Barbara, a childhood friend. Before she...

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • 1) How would you characterize US trade policy since the Great Depression of the 1930s? Reinforce...

    1) How would you characterize US trade policy since the Great Depression of the 1930s? Reinforce your argument with concrete examples of US trade policy. 2) GATT and its successor, the World Trade Organization, have established a set of rules for the commercial conduct of trading nations. Explain. 3) Discuss the economic-integration project known as the European Union in its different stages. Briefly characterize why we have come to refer to the EU as “multi-speed Europe.” 4) Discuss the key...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT