How to harden a system-operating system


Assignment:

Assignment Description

Primary Task Response: Within the Discussion Board area, write 400 to 600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

1. Describe where you would find information on how to harden a system, operating system (OS), or application.

2. What are "reputable" sources for cybersecurity information on the Internet?

o Why are these sources sharing cybersecurity information?

o What do they have to gain?

Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:

• What did you learn from your classmate's posting?

• What additional questions do you have after reading the posting?

• What clarification do you need regarding the posting?

• What differences or similarities do you see between your posting and other classmates' postings?

For assistance with your assignment, please use your text, Web resources, and all course materials.

Reading Assignment

The Art of Network Vulnerability Assessment

Resource

Shakeel, I. (n.d.). The art of network vulnerability assessment.

Assignment Objectives

• Identify security tools and hardening techniques

Solution Preview :

Prepared by a verified Expert
Business Law and Ethics: How to harden a system-operating system
Reference No:- TGS02984411

Now Priced at $25 (50% Discount)

Recommended (99%)

Rated (4.3/5)