Description
I have some hard project. Computer subject. Pls help me.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer

Studypool
4.7
Indeed
4.5

Sitejabber
4.4
24/7 Study Help
Stuck on a study question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
12 pages

Risk Management Plan Final
A solid risk management plan is required to succeed in most organizations' new projects and service development. When busi ...
Risk Management Plan Final
A solid risk management plan is required to succeed in most organizations' new projects and service development. When businesses embark on new ...

The Cybersecurity Threat Landscape Discussion
Part 1: Threat Landscape Analysis Provide a detailed analysis of the threat landscape in 2018.What has changed since 201 ...
The Cybersecurity Threat Landscape Discussion
Part 1: Threat Landscape Analysis Provide a detailed analysis of the threat landscape in 2018.What has changed since 2017?Describe common tactics, techniques, and procedures to include threat actor types.What are the exploit vectors and vulnerabilities threat actors are predicted to take advantage of? Part 2: APT Analysis Provide
a detailed analysis and description of the APT your group was assigned.
Describe the specific tactics used to gain access to the target(s).Describe the tools used. Describe what the objective of the APT was/is. Was it successful? Part 3: Cybersecurity Tools, Tactics, and Procedures Describe current hardware- and software-based cybersecurity tools, tactics, and procedures.Consider the hardware and software solutions deployed today in the context of defense-in-depth.Elaborate on why these devices are not successful against the APTs. Part 4: Machine Learning and Data Analytics Describe the concepts of machine learning and data analytics and how applying them to cybersecurity will evolve the field.Are
there companies providing innovative defensive cybersecurity measures
based on these technologies? If so, what are they? Would you recommend
any of these to the CTO? Part 5: Using Machine Learning and Data Analytics to Prevent APT Describe
how machine learning and data analytics could have detected and/or
prevented the APT you analyzed had the victim organization deployed
these technologies at the time of the event. Be specific. Notes Use additional sources of information but also describe the concept in layman's terms.Use visuals where appropriate. 8 days ago

ENTD 321 American Military University Week 2 IT Online Training Project
Please note : Need all the content in original words as turnitin will run to check the quality of work by professor. Attac ...
ENTD 321 American Military University Week 2 IT Online Training Project
Please note : Need all the content in original words as turnitin will run to check the quality of work by professor. Attached document is Assignment1 which has already been submitted. Feedback from Assignment 1 : Dinesh,The submitted document looks good with sections 1, 1.1, 1.2, 1.3, 4.3(table of classes, attributes and operations) and 4.3.1 (discussion on the list of classes) completed. Please also add ShoppingCartItem to the table of classes as it will be used in later Assignments.ThanksWeek 2-Assignment 2—Class and State DiagramsPurposeThe purpose of this assignment is to continue building our ITOT case study models by using the classes and their properties from Assignment 1 and creating a class diagram and Class and Relationship Analysis table for the relationships among classes. In addition, we will build a state diagram for the ShoppingCart class.Assignment InstructionsIn this assignment you will create a class diagram using the Class and Relationship Analysis table for all of the classes you identified in Assignment 1 and a state diagram for your ShoppingCart class. Make certain that you include all of the classes and any additional classes or corrections to your Assignment 1.For the Analysis Specification you will add the following completed sections:Sections 4, 4.1, 4.2 (adjustments if necessary), 4.3, 4.3.1, 4.4., 5, 5.1, 5.2Directions1. Read and review the Quick Resources at the end of this Assignment.2. Class Diagram. Create a UML class diagram with attributes, associations, multiplicity constraints, and operations using your CASE tool. Add your name and course number directly on your diagram. You must use the CASE tool to create your UML models!The following sections apply to creating a class diagram and provides examples. Read through them (2.1 - 2.3) before you start.2.1 Section 4.3 Lists of Classes with Definitions, Attributes, and Operations. Update your list of classes , attributes, operations, and requirements with any classes you omitted from the following list: Account, Administrator, CourseAdministrator, Book, Certificate, Course, CourseHistory, CourseSchedule, CreditCard, Customer, Instructor, Order, Payment, Product, ScheduleAdministrator, ScheduledCourse, SelfPacedCourse, ShoppingCart, ShoppingCartItem, User (username, password, status), Video, etc.2.2 Class Diagram. Section 4.1. Use your CASE tool to create a UML class diagram that includes the following classes: Customer, Account, ShoppingCart, ShoppingCartItem, Product, Video, Book, Course, Payment, and Order. Each class must have attributes, operations, and relationships to other classes. It is helpful to do a rough sketch of the diagram on paper before you create your diagram in the CASE tool. Note that Product forms a generalization hierarchy with Video, Book, and Course. You will also want to use a composition relationship in your diagram from Customer to Account, from Order to Account, and from Account to ShoppingCart . You will need to add other relationships. You will benefit from viewing the example online shopping domain UML diagram listed in the next paragraph.2.2.1 Attributes. Add attributes for each class and relationships between classes. Attributes are properties of classes, have names, and also have data types indicating the type of data expected like text, numbers, etc.. For example, a name attribute would be text type data. Relationships establish some linkage between classes and can include associations, generalization, aggregation, and composition . Associations are the most common relationships and are named with verb phrases. See the example class diagram for our case study in Sample UML Class Diagrams for ITOT Classes and http://www.uml-diagrams.org/examples/online-shopping-domain-uml-diagram-example.html for an example of a ShoppingCart class diagram similar to our model. 2.2.2 Operations. You will also need to add operations for each of your classes. A class may have its own special operations. For example a Circle class will have draw() operation. So your classes will also have their own special operations. There are also general categories of operations like the CRUD (Create Read Update Delete) operations that apply to classes and their attributes. You will want to Create() and instance of a class, read (get) the values of its attributes, update (set) the values of a class's attributes as well. We won't worry about Delete at this point in our analysis--this occurs in design. You CASE tool will help here. As you add a class using the CASE tool, if you right click on the class and choose the option to" Add attributes with getter and setter methods". Your CASE tool will automatically add getter/setter as methods for each attribute. This saves considerable time and effort. Getter/get operations are similar to read and produce values of attributes. Setter/set operations change values of attributes.2.2.3 Relationships. Class Diagram. Section 4.1. Include at least 9 named relationships with multiplicity constraints on associations to other classes. Names and multiplicity constraints are required on all associations. The shape of the line used indicates the type of relationship for generalization, aggregation, and composition relationships so you do not need names here. Association names are often verb phrases like “purchases” from “A Customer purchases a ScheduledCourse”. To determine the associations, you can also use the same technique as the noun analysis, but do verb analysis instead. Review Section 2.2 above for some pointers on relationships. To help you discover the associations and multiplicity constraints, complete the Class and Relationship Analysis table below and add it to Section 4.2 . The class and Relationship Analysis table is already included in Section 4.2 of your specification.Identify the relationships among the classes. Associations are bidirectional and so we must consider them in both directions with multiplicity constraints as well. Using a table for the initial analysis will make it easier to create a class diagram. For each class ask the question "What other classes is the class related to?" or "What is the relationship between these two classes?" Once you identify the classes, then for each class pair ask "What is the relationship?" Multiplicity constraints are needed on both ends of the association and may be zero or one (0..1), one and only (1), zero or more (0..*), or many (*) ,etc. As you can see below there are two sentences with the multiplicity constraints describing the association in both directions. In this example the two classes are Instructor and Course. The relationship is "teaches". On our diagrams we usually only show the relationship name in one direction and mentally reverse the verb phrase in the other direction. See Figures 3.12 and 3.15 in your textbook for an example of a class diagram with named associations and multiplicity constraints.Class and Relationship AnalysisClass Name 1Relationship with MultiplicityClass Name 2InstructorAn Instructor teaches zero or more (0..*) CourseA Course is taught by a single (1) InstructorCourse2.2.3.1 Section 4.1. Add multiplicity constraints that you identified in the Class and Relationship Analysis table to each end of a relationship between classes. UML multiplicity constraints include the pairs 1..1, 1..*, *..*, 0..1, as well as others.2.3 Section 4.1 Place your completed class diagram in Section 4.1.2.4 Section 4.1. Make certain that you continue from your Assignment 1 submission. Each week we will add to the Analysis Specification document until we finally complete it. So just take your previous assignment and add this assignment to it.2.5 Section 4. Complete Section 4 of the Analysis Specification with a brief introduction to the contents of the section. You can now include this since you have completed your class diagram.2.6 Sections 4.1, 4.2 and 4.3. These sections should be consistent. Make any necessary adjustments from Assignment 1 and the list of classes provided above. Update your discussion in Section 4.3.1 to reflect the new classes.2.7 Section 4.4. Complete Section 4.4 of the Analysis Specification with a discussion of your class diagram.3. Create a UML state diagram for the ShoppingCart class with your CASE tool. Add your name and course number directly on your diagram. Make certain that you name the transitions and add guards as necessary. States are named using gerunds (ing verb form), past participle, prepositional phrases, or attributes. A state diagram is not an activity diagram! For example for a pizza you might order online the states might be building, assembling,baking, quality checking, delivering, delivered3.1 Sections 5.1 and 5.2. Add your UML state diagram along with a discussion to Sections 5.1 and 5.2 of your Analysis Specification. See the article, ENTD321 Lesson 2 State How to Create a State Diagram.pdf, below on creating a state transition diagram before you start your diagram.3.2 Section 5. Complete Section 5 of your Analysis Specification with an introduction the section contents.Submission Instructions1. Submit your updated Analysis Specification as a Word file. 2. When you submit your Word file, use your name as part of the file name, e.g., ENTD321Assignment2_FirstNameLastName. Also make certain that your name and course number is at the top of your document.
7 pages

Case Study
1. How is a strategy different from a business model? How is it similar? Business strategy and business model are two diff ...
Case Study
1. How is a strategy different from a business model? How is it similar? Business strategy and business model are two different things based on the ...

Grand Canyon University Windows Server Security Assessment
Assessment Description
Hardening a system provides an additional layer of security by removing access and possible vulnera ...
Grand Canyon University Windows Server Security Assessment
Assessment Description
Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system. Security principles such as deter, deny, delay, and detect are used to reduce attack surfaces and possible vectors. Reference the “System Hardening” video as needed to complete the lab.
Provide screenshots of each step in Part 1. On each screenshot, include 1-2 sentences that summarize what the screenshot is illustrating. For Part 2, provide screenshots of the results. All the screenshots will be used to manage network configuration and sessions to ensure port security that will harden the Windows Server.
Part 1
In the virtual sandbox environment, you will perform the steps to harden a Linux distribution by doing the following:
Add a Linux OS VM (Ubuntu, Kali, Parrot, or SecurityOnion).
On the Linux VM, open a terminal and run apt-get install lynis
To run Lynis, navigate to the correct directory and add './' in from of the command.
./lynis
Run a basic scan. This may take several minutes.
$ lynis audit system
Part 2
Access the Windows Server VM and perform the following hardening steps:
Disable automatic administrative logon to the recovery console.
Set a BIOS/firmware password to prevent unauthorized changes to the server startup settings.
Configure the device boot order to prevent unauthorized booting from alternate media.
Enable the Windows firewall in all profiles (domain, private, public) and configure it to block inbound traffic by default.
Perform port blocking at the network setting level. Perform an analysis to determine which ports need to be open and restrict access to all other ports.
Disable NetBIOS over TCP/IP and remove ncacn_ip_tcp.
Check the Windows Defender settings.
Configure allowable encryption types for Kerberos.
Do not store LAN Manager hash values.
Set the LAN Manager authentication level to allow only NTLMv2 and refuse LM and NTLM.
Remove file and print sharing from network settings. File and print sharing could allow anyone to connect to a server and access critical data without requiring a user ID or password.
Disable unneeded services. Most servers have the default install of the operating system, which often contains extraneous services that are not needed for the system to function and that represent a security vulnerability. Therefore, it is critical to remove all unnecessary services from the system.
Remove unneeded Windows components. Any unnecessary Windows components should be removed from critical systems to keep the servers in a secure state.
Enable the built-in Encrypting File System (EFS) with NTFS or BitLocker on Windows Server.
Install an open-source antivirus program of your choice
Run your antivirus program against your machine
Part 3
Examine the antivirus program you installed. Research potential faults and vulnerabilities within the program, including the open-source nature of the program.
Write a lab report that includes a title page, table of contents, overview, and the required screenshots with summaries.
Describe the strengths and weaknesses associated with the open-source antivirus program you installed running in an enterprise network.

Consider the PCI-DSS self-assessment questionnaire (SQA-D)
Consider the PCI-DSS self-assessment questionnaire (SQA-D) which a typical retail merchant would have to show compliance i ...
Consider the PCI-DSS self-assessment questionnaire (SQA-D)
Consider the PCI-DSS self-assessment questionnaire (SQA-D) which a typical retail merchant would have to show compliance in order to continue doing business for credit cards.Review the questions associated with four different sections of the 12 covered by the assessment questions (specifically sections 3, 8, 9, and one other section of your choice)For each section explain:The purpose of that section, why it is important, and what these questions seek to achieve.Pick any three questions in that section and explain:What the question meansWhat evidence would be needed to show complianceWhether it would be easy or difficult to achieve compliance and whyDo not pick three that are all easySummarize your impressions of the questions for this section and discuss how a merchant would establish or maintain complianceFor any question that you examined in item 2 above, (which was deemed hard to comply with) assume that you cannot fully meet the requirement and draft up a half-page compensating control that would substitute for a fully compliant response.Lastly, write a 1-paragraph summary about what you learned from this exercise.Link for SQA-D: https://www.pcisecuritystandards.org/documents/PCI...
Similar Content
UMKC Digital Rights Management in Cybersecurity Research Paper
***Using the internet, write a paper on the below, write out the questions and any references below.
Research the cu...
University of the Cumberlands Cloud Computing Technologies Discussion
For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitab...
project assignment
This week's deliverable for the final data project is as follows:Week 3 – Start definition of conceptual data model for ...
Security Asset Identification ,computer science homework help
Please.. Absolutely no plagiarism. I will check this with a plagiarism checker before paying. It also has to be turned in ...
KfUPM Cyber Defense in Web Based Attacks Hybridized Authentication Essay
I need to discussion about Hybridized Authentication ( definition, Advantages and disadvantages and The opinion of specia...
VCU Role of Probability Distribution in Business Management Paper
Write a 2 page APA formatted summary on the use of Probability in businessUse the following reference: Role of Probability...
Question1.edited
The 21st century has witnessed tremendous growth in technology that has impacted every aspect of man’s life. Possessing ...
Blackberry
Technology products that have ever used but I no longer use Five years ago, I remembered using my Blackberry Cellphone and...
Research Model
The most challenging stage in the Big6 Research Model is the evaluation stage. Judging the effectiveness of the product wa...
Related Tags
Book Guides
The Iliad
by Homer
Team of Vipers
by Cliff Sims
Big Little Lies
by Liane Moriarty
Oliver Twist
by Charles Dickens
Pride and Prejudice
by Jane Austen
The Girl With The Dragon Tattoo
by Stieg Larsson
Into Thin Air
by Jon Krakauer
Treasure Island
by Robert Louis
Cant Hurt Me - Master Your Mind and Defy the Odds
by David Goggins

Get 24/7
Study help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
12 pages

Risk Management Plan Final
A solid risk management plan is required to succeed in most organizations' new projects and service development. When busi ...
Risk Management Plan Final
A solid risk management plan is required to succeed in most organizations' new projects and service development. When businesses embark on new ...

The Cybersecurity Threat Landscape Discussion
Part 1: Threat Landscape Analysis Provide a detailed analysis of the threat landscape in 2018.What has changed since 201 ...
The Cybersecurity Threat Landscape Discussion
Part 1: Threat Landscape Analysis Provide a detailed analysis of the threat landscape in 2018.What has changed since 2017?Describe common tactics, techniques, and procedures to include threat actor types.What are the exploit vectors and vulnerabilities threat actors are predicted to take advantage of? Part 2: APT Analysis Provide
a detailed analysis and description of the APT your group was assigned.
Describe the specific tactics used to gain access to the target(s).Describe the tools used. Describe what the objective of the APT was/is. Was it successful? Part 3: Cybersecurity Tools, Tactics, and Procedures Describe current hardware- and software-based cybersecurity tools, tactics, and procedures.Consider the hardware and software solutions deployed today in the context of defense-in-depth.Elaborate on why these devices are not successful against the APTs. Part 4: Machine Learning and Data Analytics Describe the concepts of machine learning and data analytics and how applying them to cybersecurity will evolve the field.Are
there companies providing innovative defensive cybersecurity measures
based on these technologies? If so, what are they? Would you recommend
any of these to the CTO? Part 5: Using Machine Learning and Data Analytics to Prevent APT Describe
how machine learning and data analytics could have detected and/or
prevented the APT you analyzed had the victim organization deployed
these technologies at the time of the event. Be specific. Notes Use additional sources of information but also describe the concept in layman's terms.Use visuals where appropriate. 8 days ago

ENTD 321 American Military University Week 2 IT Online Training Project
Please note : Need all the content in original words as turnitin will run to check the quality of work by professor. Attac ...
ENTD 321 American Military University Week 2 IT Online Training Project
Please note : Need all the content in original words as turnitin will run to check the quality of work by professor. Attached document is Assignment1 which has already been submitted. Feedback from Assignment 1 : Dinesh,The submitted document looks good with sections 1, 1.1, 1.2, 1.3, 4.3(table of classes, attributes and operations) and 4.3.1 (discussion on the list of classes) completed. Please also add ShoppingCartItem to the table of classes as it will be used in later Assignments.ThanksWeek 2-Assignment 2—Class and State DiagramsPurposeThe purpose of this assignment is to continue building our ITOT case study models by using the classes and their properties from Assignment 1 and creating a class diagram and Class and Relationship Analysis table for the relationships among classes. In addition, we will build a state diagram for the ShoppingCart class.Assignment InstructionsIn this assignment you will create a class diagram using the Class and Relationship Analysis table for all of the classes you identified in Assignment 1 and a state diagram for your ShoppingCart class. Make certain that you include all of the classes and any additional classes or corrections to your Assignment 1.For the Analysis Specification you will add the following completed sections:Sections 4, 4.1, 4.2 (adjustments if necessary), 4.3, 4.3.1, 4.4., 5, 5.1, 5.2Directions1. Read and review the Quick Resources at the end of this Assignment.2. Class Diagram. Create a UML class diagram with attributes, associations, multiplicity constraints, and operations using your CASE tool. Add your name and course number directly on your diagram. You must use the CASE tool to create your UML models!The following sections apply to creating a class diagram and provides examples. Read through them (2.1 - 2.3) before you start.2.1 Section 4.3 Lists of Classes with Definitions, Attributes, and Operations. Update your list of classes , attributes, operations, and requirements with any classes you omitted from the following list: Account, Administrator, CourseAdministrator, Book, Certificate, Course, CourseHistory, CourseSchedule, CreditCard, Customer, Instructor, Order, Payment, Product, ScheduleAdministrator, ScheduledCourse, SelfPacedCourse, ShoppingCart, ShoppingCartItem, User (username, password, status), Video, etc.2.2 Class Diagram. Section 4.1. Use your CASE tool to create a UML class diagram that includes the following classes: Customer, Account, ShoppingCart, ShoppingCartItem, Product, Video, Book, Course, Payment, and Order. Each class must have attributes, operations, and relationships to other classes. It is helpful to do a rough sketch of the diagram on paper before you create your diagram in the CASE tool. Note that Product forms a generalization hierarchy with Video, Book, and Course. You will also want to use a composition relationship in your diagram from Customer to Account, from Order to Account, and from Account to ShoppingCart . You will need to add other relationships. You will benefit from viewing the example online shopping domain UML diagram listed in the next paragraph.2.2.1 Attributes. Add attributes for each class and relationships between classes. Attributes are properties of classes, have names, and also have data types indicating the type of data expected like text, numbers, etc.. For example, a name attribute would be text type data. Relationships establish some linkage between classes and can include associations, generalization, aggregation, and composition . Associations are the most common relationships and are named with verb phrases. See the example class diagram for our case study in Sample UML Class Diagrams for ITOT Classes and http://www.uml-diagrams.org/examples/online-shopping-domain-uml-diagram-example.html for an example of a ShoppingCart class diagram similar to our model. 2.2.2 Operations. You will also need to add operations for each of your classes. A class may have its own special operations. For example a Circle class will have draw() operation. So your classes will also have their own special operations. There are also general categories of operations like the CRUD (Create Read Update Delete) operations that apply to classes and their attributes. You will want to Create() and instance of a class, read (get) the values of its attributes, update (set) the values of a class's attributes as well. We won't worry about Delete at this point in our analysis--this occurs in design. You CASE tool will help here. As you add a class using the CASE tool, if you right click on the class and choose the option to" Add attributes with getter and setter methods". Your CASE tool will automatically add getter/setter as methods for each attribute. This saves considerable time and effort. Getter/get operations are similar to read and produce values of attributes. Setter/set operations change values of attributes.2.2.3 Relationships. Class Diagram. Section 4.1. Include at least 9 named relationships with multiplicity constraints on associations to other classes. Names and multiplicity constraints are required on all associations. The shape of the line used indicates the type of relationship for generalization, aggregation, and composition relationships so you do not need names here. Association names are often verb phrases like “purchases” from “A Customer purchases a ScheduledCourse”. To determine the associations, you can also use the same technique as the noun analysis, but do verb analysis instead. Review Section 2.2 above for some pointers on relationships. To help you discover the associations and multiplicity constraints, complete the Class and Relationship Analysis table below and add it to Section 4.2 . The class and Relationship Analysis table is already included in Section 4.2 of your specification.Identify the relationships among the classes. Associations are bidirectional and so we must consider them in both directions with multiplicity constraints as well. Using a table for the initial analysis will make it easier to create a class diagram. For each class ask the question "What other classes is the class related to?" or "What is the relationship between these two classes?" Once you identify the classes, then for each class pair ask "What is the relationship?" Multiplicity constraints are needed on both ends of the association and may be zero or one (0..1), one and only (1), zero or more (0..*), or many (*) ,etc. As you can see below there are two sentences with the multiplicity constraints describing the association in both directions. In this example the two classes are Instructor and Course. The relationship is "teaches". On our diagrams we usually only show the relationship name in one direction and mentally reverse the verb phrase in the other direction. See Figures 3.12 and 3.15 in your textbook for an example of a class diagram with named associations and multiplicity constraints.Class and Relationship AnalysisClass Name 1Relationship with MultiplicityClass Name 2InstructorAn Instructor teaches zero or more (0..*) CourseA Course is taught by a single (1) InstructorCourse2.2.3.1 Section 4.1. Add multiplicity constraints that you identified in the Class and Relationship Analysis table to each end of a relationship between classes. UML multiplicity constraints include the pairs 1..1, 1..*, *..*, 0..1, as well as others.2.3 Section 4.1 Place your completed class diagram in Section 4.1.2.4 Section 4.1. Make certain that you continue from your Assignment 1 submission. Each week we will add to the Analysis Specification document until we finally complete it. So just take your previous assignment and add this assignment to it.2.5 Section 4. Complete Section 4 of the Analysis Specification with a brief introduction to the contents of the section. You can now include this since you have completed your class diagram.2.6 Sections 4.1, 4.2 and 4.3. These sections should be consistent. Make any necessary adjustments from Assignment 1 and the list of classes provided above. Update your discussion in Section 4.3.1 to reflect the new classes.2.7 Section 4.4. Complete Section 4.4 of the Analysis Specification with a discussion of your class diagram.3. Create a UML state diagram for the ShoppingCart class with your CASE tool. Add your name and course number directly on your diagram. Make certain that you name the transitions and add guards as necessary. States are named using gerunds (ing verb form), past participle, prepositional phrases, or attributes. A state diagram is not an activity diagram! For example for a pizza you might order online the states might be building, assembling,baking, quality checking, delivering, delivered3.1 Sections 5.1 and 5.2. Add your UML state diagram along with a discussion to Sections 5.1 and 5.2 of your Analysis Specification. See the article, ENTD321 Lesson 2 State How to Create a State Diagram.pdf, below on creating a state transition diagram before you start your diagram.3.2 Section 5. Complete Section 5 of your Analysis Specification with an introduction the section contents.Submission Instructions1. Submit your updated Analysis Specification as a Word file. 2. When you submit your Word file, use your name as part of the file name, e.g., ENTD321Assignment2_FirstNameLastName. Also make certain that your name and course number is at the top of your document.
7 pages

Case Study
1. How is a strategy different from a business model? How is it similar? Business strategy and business model are two diff ...
Case Study
1. How is a strategy different from a business model? How is it similar? Business strategy and business model are two different things based on the ...

Grand Canyon University Windows Server Security Assessment
Assessment Description
Hardening a system provides an additional layer of security by removing access and possible vulnera ...
Grand Canyon University Windows Server Security Assessment
Assessment Description
Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system. Security principles such as deter, deny, delay, and detect are used to reduce attack surfaces and possible vectors. Reference the “System Hardening” video as needed to complete the lab.
Provide screenshots of each step in Part 1. On each screenshot, include 1-2 sentences that summarize what the screenshot is illustrating. For Part 2, provide screenshots of the results. All the screenshots will be used to manage network configuration and sessions to ensure port security that will harden the Windows Server.
Part 1
In the virtual sandbox environment, you will perform the steps to harden a Linux distribution by doing the following:
Add a Linux OS VM (Ubuntu, Kali, Parrot, or SecurityOnion).
On the Linux VM, open a terminal and run apt-get install lynis
To run Lynis, navigate to the correct directory and add './' in from of the command.
./lynis
Run a basic scan. This may take several minutes.
$ lynis audit system
Part 2
Access the Windows Server VM and perform the following hardening steps:
Disable automatic administrative logon to the recovery console.
Set a BIOS/firmware password to prevent unauthorized changes to the server startup settings.
Configure the device boot order to prevent unauthorized booting from alternate media.
Enable the Windows firewall in all profiles (domain, private, public) and configure it to block inbound traffic by default.
Perform port blocking at the network setting level. Perform an analysis to determine which ports need to be open and restrict access to all other ports.
Disable NetBIOS over TCP/IP and remove ncacn_ip_tcp.
Check the Windows Defender settings.
Configure allowable encryption types for Kerberos.
Do not store LAN Manager hash values.
Set the LAN Manager authentication level to allow only NTLMv2 and refuse LM and NTLM.
Remove file and print sharing from network settings. File and print sharing could allow anyone to connect to a server and access critical data without requiring a user ID or password.
Disable unneeded services. Most servers have the default install of the operating system, which often contains extraneous services that are not needed for the system to function and that represent a security vulnerability. Therefore, it is critical to remove all unnecessary services from the system.
Remove unneeded Windows components. Any unnecessary Windows components should be removed from critical systems to keep the servers in a secure state.
Enable the built-in Encrypting File System (EFS) with NTFS or BitLocker on Windows Server.
Install an open-source antivirus program of your choice
Run your antivirus program against your machine
Part 3
Examine the antivirus program you installed. Research potential faults and vulnerabilities within the program, including the open-source nature of the program.
Write a lab report that includes a title page, table of contents, overview, and the required screenshots with summaries.
Describe the strengths and weaknesses associated with the open-source antivirus program you installed running in an enterprise network.

Consider the PCI-DSS self-assessment questionnaire (SQA-D)
Consider the PCI-DSS self-assessment questionnaire (SQA-D) which a typical retail merchant would have to show compliance i ...
Consider the PCI-DSS self-assessment questionnaire (SQA-D)
Consider the PCI-DSS self-assessment questionnaire (SQA-D) which a typical retail merchant would have to show compliance in order to continue doing business for credit cards.Review the questions associated with four different sections of the 12 covered by the assessment questions (specifically sections 3, 8, 9, and one other section of your choice)For each section explain:The purpose of that section, why it is important, and what these questions seek to achieve.Pick any three questions in that section and explain:What the question meansWhat evidence would be needed to show complianceWhether it would be easy or difficult to achieve compliance and whyDo not pick three that are all easySummarize your impressions of the questions for this section and discuss how a merchant would establish or maintain complianceFor any question that you examined in item 2 above, (which was deemed hard to comply with) assume that you cannot fully meet the requirement and draft up a half-page compensating control that would substitute for a fully compliant response.Lastly, write a 1-paragraph summary about what you learned from this exercise.Link for SQA-D: https://www.pcisecuritystandards.org/documents/PCI...
Earn money selling
your Study Documents