Question
home / study / engineering / computer science / computer science questions and answers / al asaass chief technology officer (cto) established a plan to
home / study / engineering / computer science / computer science questions and answers / al asaass chief technology officer (cto) established a plan to mitigate risks, threats, ...
Your question has been posted.
We'll notify you when a Chegg Expert has answered. Post another question.
Next time just snap a photo of your problem. No typing, no scanning, no explanation required.
Get Chegg Study App
Question: Al ASAASs chief technology officer (CTO) established a plan to mitigate risks, threats, and vuln...
Edit question
Al ASAASs chief technology officer (CTO) established a plan to mitigate risks, threats, and vulnerabilities. As part of the mitigation plan, you and your team members will configure baseline security controls on all workstations (harden the systems), which run either Windows 7 or Windows 10. For this effort, you will ensure that the antivirus software is running properly and implement a control related to password-hacking attempts.
In addition, Al ASAASs CTO has asked your team to pay special consideration to continuously monitoring, testing, and improving countermeasures. The CTO points out that within the first 24 hours of configuring baseline security, you may sometimes receive alerts that malware has been quarantined within an antivirus program or notice a failed logon attempt captured by the Windows audit log. In response, you make a note to check the security of the workstation for which you will configure baseline security.
The CTO also requests a report on the work you performed, part of which will be incorporated into the company's IT security policy procedures. The report should also include the purposes of system hardening and auditing, and an additional area of concern or emerging trend related to information systems security that's relevant to Al ASAAS.
At the end of the report, include a brief statement that explains how your work on this project relates to the larger responsibility you have for supporting the companys success regarding IT security. Your statement will be considered a part of your upcoming performance review.
Tasks
If possible, complete the hardening and auditing tasks using a personal computer with the default installation of Windows 7 or Windows 10. If you do not own the necessary hardware and software, consult with your instructor about alternatives. After your work on this project is complete, you may need to return the settings to the previous configuration.
I. Ensure that you are logged in as an administrator. Using a computer that has Windows 7 or Windows 10 installed:
a. Review the antivirus program. Ensure that it is up to date, is configured for automatic updates, and is scheduled to run quick scans regularly. Note when the last full system scan was run and any issues you observe with the software.
b. Configure audit logging to identify all failed password attempts into the system.
II. After at least 24 hours, check the Windows workstation for security events. Be sure to review the audit log in Windows Event Viewer.
III. Write a report in which you:
1- Explain how you ensured the antivirus program is up to date, scheduled to run regular quick scans, and when the last full system scan was run. Describe anything significant you observed.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started