Computer science

Paper details: Project II: System HardeningScenario

You have been working as a technology associate in the information systems department at Corporation Techs for three months now. You have conducted a network survey and developed a basic network design intended to provide security for private network resources and publically exposed Web services.
Your manager specified that all information transferred between the sales team in the field and the organizational servers must be protected against snooping. The manager also wants the secured reporting site to be available only through the organization’s private network so that an outsourced network-based intrusion detection system (NIDS) service can log all connections.


Discuss system hardening strategies and techniques including updates and patches, default logon/passwords, anonymous access, removal of unneeded services, separation of production and development environments, and settings such as password length and complexity by answering the following questions:
 What hardening guidelines or standards are you familiar with?
 What steps have you taken to harden systems?
 What function do each of the strategies discussed serve?

Submission Requirements
 Format: Microsoft Word
 Font: Arial, Size 12, Double-Space
 Citation Style: Follow APA format style. .
 Length: 3 pages, excluding the title page and the reference page.

buy custom essay