Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Project Part 3: Monitoring and Reporting Scenario Fullsoft’s CTO asks you to con

ID: 3880026 • Letter: P

Question

Project Part 3: Monitoring and Reporting
Scenario
Fullsoft’s CTO asks you to continue training the new employee, and highlight the importance of
continuously monitoring, testing, and improving countermeasures. You inform your new teammate that
even within the first 24 hours of configuring baseline security, you may sometimes receive alerts that
malware has been quarantined within an antivirus program, discover that a disabled service has been
turned on (likely via malware), or notice a failed attempt to log in captured by the audit log. To illustrate
this point, you decide to check and report on the security of the workstation for which you and your new
teammate configured baseline security.
In addition, the CTO requests that you write a brief statement explaining how your work on this project
relates to the larger responsibility you have for supporting the company’s success. Your statement will be
considered a part of your upcoming performance review.
Tasks
Check the Windows 7 workstation you configured (in Project Part 2) for security events. Be sure to review
the last 24 hours of the audit log in Event Viewer.
Write a brief report in which you:
• Describe all the potentially problematic security events that occurred in the 24-hour period.
• Explain what was done (or should be done) to correct the problems encountered.
Also write a brief statement explaining how your work on this project relates to your responsibility to help
the company achieve its goals. Describe at least additional area of concern or emerging trend related to
information systems security that you think warrants the company’s attention in the immediate future.
As a reminder, you may use the book for this course and the Internet to conduct research. You are
encouraged to respond creatively, but you must cite credible sources to support your work.

Explanation / Answer

These are all the potentially problematic security events that have occured and the steps of how to get immune to all these possible vulnerabilities for the systems in the company.

CIS Control #4: Continuous Vulnerability Assessment and Remediation

The handling and remediation of the vulnerability is the most important part because it plays an major role in getting the company devised to make the system or the network secure.Hence, here is the complete explaination to the continuous Vulnerability Assesment and the Remediation.

Flaws:

Security Issues:

Hence, these are the possible security issues that might be residing in the Chromium.

Exploiting Vulnerabilities:

Hence, these are the exploits that are undertaken by an hacker to harm the victim in any possible way.

Rate an upvote.....Thankyou

Hope it helps.....