Access Millions of academic & study documents

Task 4 Final

Content type
User Generated
Subject
Computer Science
School
University of the Cumberlands
Type
Homework
Showing Page:
1/5
Running head: TASK 4 1
Task 4
Student’s Name
Institution Affiliation

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5
TASK 4 2
Task 4
Hardening of the operation system (OS) is identified as the act of securing the OS,
provided required updates, create relevant rules and policies that provide proper governance
to the system in a secure manner and ensure any unnecessary applications and services are
removed. The primary objective of hardening the OS is to ensure there is the minimization of
the OS exposure to any potential threats, and any possible risks are mitigated (Tamir et
al., 2017).
Every operating system is different and has its own intricate, but there are
recommended hardening practices that can be applied universally (Zamora, Kwiatek, Bippus,
and Elejalde, 2019). First, program clean-up the IT manager is recommended to conduct
clean up in the system occasionally to remove any unwanted programs in the system.
Attackers are keen to look for backdoors and any possible security hole with the intent to
compromise the networks. Second, it is vital to use service packs that ensure there is up to
date installation of the latest software and versions. The ability to have the proper update
done on the system provides the chances of any possible attacks are reduced.
Third, ensure patch management is conducted entailing testing, planning, and
implementation of proposed patch recommendations regularly (Zamora, Kwiatek, Bippus,
and Elejalde, 2019). The OS must be patched periodically, and individual programs need to
be well protected. Fourth, IT managers are required to define the group policies in any system
by checking on who is given access to the materials available and what are the set regulations
to ensure proper guidance is given. Five, it is essential to check on the configuration baselines
that evaluates any possible changes to be made on the OS software, hardware, and network.
A baseline is developed after consistent evaluations of the system and the baseline used as a
set standard. Finally, it is essential to provide security templates that are often utilized in

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
Running head: TASK 4 1 Task 4 Student’s Name Institution Affiliation 2 TASK 4 Task 4 Hardening of the operation system (OS) is identified as the act of securing the OS, provided required updates, create relevant rules and policies that provide proper governance to the system in a secure manner and ensure any unnecessary applications and services are removed. The primary objective of hardening the OS is to ensure there is the minimization of the OS exposure to any potential threats, and any possible risks are mitigated (Tamir et al., 2017). Every operating system is different and has its own intricate, but there are recommended hardening practices that can be applied universally (Zamora, Kwiatek, Bippus, and Elejalde, 2019). First, program clean-up the IT manager is recommended to conduct clean up in the system occasionally to remove any unwanted programs in the system. Attackers are keen to look for backdoors and any possible security hole with the intent to compromise the networks. Second, it is vital to use service packs that ensure there is up to date installation of the latest software and versions. The ability to have the proper update done on the system provides the chances of any possible attacks are reduced. Third, ensure patch management is conducted entailing testing, planning, and implementation of proposed patch recommendations regularly (Zamora, Kwiatek, Bippus, and Elejalde, 2019). The OS must be patched periodically, and individual programs need to be w ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4