Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Fullsoft\'s chief tech officer established a plan to mitigate risks, threats, &v

ID: 3869522 • Letter: F

Question

Fullsoft's chief tech officer established a plan to mitigate risks, threats, &vulnerabilities.; As part of the mitigation plan, u and ur team members will configure baseline security controls on all workstations (harden the systems), which run either Win 7 or Win 10. For this effort, u will ensure that the antivirus sftwr is running properly & implement a control related to password-hacking attempts. In addition, Fullsoft's CTO has asked ur team to pay special consideration to continuously monitoring, testing, & improving countermeasures. The CTO points out that w/in the first 24 hrs of configuring baseline security, u may sometimes receive alerts that malware has been quarantined w/in an antivirus program or notice a failed logon attempt captured by the Win audit log. In response, u make note to check the sec. of the workstation for which u will configure baseline sec. The CTO also requests a report on the work u performed, part of which will be incorporated into the comp's IT sec. policy procedures. The report should also include the purposes of syst hardening & auditing, & an additnl area of concern or emerging trend related to info sys security that's relevant to Fullsoft. Explain how u ensured the antivirus program is up to date, scheduled to run regular quick scans, & when the last full sys scan was run. Describe anything significant you observed.

Explanation / Answer

Question 1.

For the proper verification the antivirus program needs to be checked properly.In the application we have to verify whether it is upto date or not and also to check whether it is having any update or patch available for the version.Also the log of the last full system scan has to be checked and also all the security options has to be enabled for full secureity purpose.

Question 2

Everytime when a user is logged in the detailed activity is always stored in a log.It should be checked properly which shows the activity of the user,the login failure which was successsfull and so on.The number of force attempt or change password would show the unwated login and hence security level can be elevated on basis of that.

Question 3

On screening the logs there may be low security presense in the anivirus,unwated application,junks files and so.

Question 4

For the following isssue the steps which can be taken are as follows
a.Updating the antivirus at regular interval and also keeping all the security control active for the antivirs.
b.Deleting all the unwanted application from the system. and removing all the junk files from the system.