Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Assignment 7 - 2 : Operating System Hardening and Security Measures Introduction: In this assignment, you will learn how to harden your base operating system

Assignment 7-2: Operating System Hardening and Security Measures
Introduction: In this assignment, you will learn how to harden your base operating system following the Center for Internet Security (CIS) Hardening Guidelines. Additionally, you will set up a BIOS password, disable unused user accounts, and ensure that the Windows OS is adequately patched for enhanced security.
Task 1: Harden the Base Operating System Using CIS Hardening Guidelines
Step 1: CIS Hardening Guidelines
Obtain a copy of the CIS Hardening Guidelines for your specific operating system (e.g., Windows, Linux).
Review the guidelines for securing your base operating system.
Implement the recommended security settings and configurations based on the guidelines.
Task 2: Set Up BIOS Password
Step 1: Access BIOS Settings
Reboot your computer and access the BIOS settings by pressing the appropriate key during startup (usually Del, F2, or F12).
Navigate to the security or password settings in the BIOS.
Step 2: Set BIOS Password
Set a BIOS password to restrict unauthorized access to BIOS settings.
Follow the instructions in your BIOS interface to create a strong BIOS password.
Task 3: Disable Unused User Accounts
Step 1: User Account Management
Log in to your operating system.
Access the user account management settings (e.g., User Accounts on Windows, usermod or userdel on Linux).
Step 2: Disable Unused User Accounts
Identify user accounts that are not in use or necessary for system operation.
Disable these accounts to prevent unauthorized access.
Task 4: Ensure Adequate Patching of Windows OS
Step 1: Windows Update
Access the Windows Update settings on your Windows operating system.
Check for available updates.
Step 2: Install Updates
Install all available critical and security updates to ensure your Windows OS is adequately patched.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Transactions On Large Scale Data And Knowledge Centered Systems Xxviii Special Issue On Database And Expert Systems Applications Lncs 9940

Authors: Abdelkader Hameurlain ,Josef Kung ,Roland Wagner ,Qimin Chen

1st Edition

3662534541, 978-3662534540

More Books

Students also viewed these Databases questions

Question

Has the team been empowered to prioritize the issues?

Answered: 1 week ago

Question

Have issues been prioritized?

Answered: 1 week ago

Question

Has the priority order been provided by someone else?

Answered: 1 week ago