{"id":72021,"date":"2021-11-07T21:55:26","date_gmt":"2021-11-07T21:55:26","guid":{"rendered":"https:\/\/papersspot.com\/blog\/2021\/11\/07\/easy-and-own-words-discussion-topic-one-page-only\/"},"modified":"2021-11-07T21:55:26","modified_gmt":"2021-11-07T21:55:26","slug":"easy-and-own-words-discussion-topic-one-page-only","status":"publish","type":"post","link":"https:\/\/papersspot.com\/blog\/2021\/11\/07\/easy-and-own-words-discussion-topic-one-page-only\/","title":{"rendered":"easy and own words, discussion topic, one page only,"},"content":{"rendered":"<p> discussion deals with Operating systems and its vulnerabilities.\u00a0 An \u00a0operating system is defined as the following:\u00a0 A software that manages \u00a0the hardware and software of a system.\u00a0 It also provides the User \u00a0Interface that allows humans to interact with the system. As much of the \u00a0information is either created and\/or stored in the system, securing the \u00a0OS requires a thorough understanding of the Operating system and how to \u00a0secure it.\u00a0 There are many different types of operating systems that \u00a0exist, either for desktops, routers, switches, servers, and mobile \u00a0devices. <\/p>\n<p> In the previous week\u2019s discussion, you identified and discussed a system and its vulnerabilities.\u00a0 <\/p>\n<p> Based on the definition above, please identify the operating \u00a0system.\u00a0 Provide recommendations on how you would secure and harden the \u00a0operating system to ensure it has been configured more securely. <\/p>\n<p> Based on the system and its operating system, please research the \u00a0vendor and its website to identify any hardening guides and documents \u00a0you may find.\u00a0 You may also research other sources on the Internet for a \u00a0hardening guide.\u00a0 Some of useful sites you may visit are the following:\u00a0<\/p>\n<p> SANS Information Security\u00a0(Links to an external site.) \u00a0&#8211; SANS is a valuable information Security resource.\u00a0 SANS organization \u00a0has been recognized within the Information Security community as an \u00a0indispensable tool for all security needs.\u00a0 The reading room serves as \u00a0the repository on thousands of white papers and documents regarding \u00a0information security.\u00a0 It has templates on creating InfoSec policies and \u00a0guidelines on how to configure IT systems securely. <\/p>\n<p> Best Practices and How To Articles\u00a0(Links to an external site.) \u00a0&#8211; Here is a collection of Information Security policy documents, best \u00a0practices, and how to articles for Information Security.\u00a0 It can be used \u00a0to help develop hardening documents. <\/p>\n<p> National Vulnerability Database Repository\u00a0(Links to an external site.) \u00a0&#8211; National Institute of Standards and Technology is a government agency \u00a0that is tasked with developing standards on all technology, from IT to \u00a0non-IT technology and things like standard weights and measure.\u00a0 Many \u00a0regulations that drive Information Security reference NIST as a source \u00a0for standard methodologies used in the industry. <\/p>\n<p> Based on your research, please list and discuss any operating system \u00a0configuration that needs to be evaluated and hardened.\u00a0 Please identify \u00a0the default setting and what it needs to be to ensure a higher level of \u00a0security.\u00a0 You should also indicate the importance of the setting. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>discussion deals with Operating systems and its vulnerabilities.\u00a0 An \u00a0operating system is defined as the following:\u00a0 A software that manages \u00a0the hardware and software of a system.\u00a0 It also provides the User \u00a0Interface that allows humans to interact with the system. As much of the \u00a0information is either created and\/or stored in the system, securing [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[28],"class_list":["post-72021","post","type-post","status-publish","format-standard","hentry","category-research-paper-writing","tag-computer-science"],"_links":{"self":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/72021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/comments?post=72021"}],"version-history":[{"count":0,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/72021\/revisions"}],"wp:attachment":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/media?parent=72021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/categories?post=72021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/tags?post=72021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}