Preview

Information Technology

Satisfactory Essays
Open Document
Open Document
389 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Technology
Armando Zavala
Unit 1 Discussion 1
IS3440 Linux Security
Securing a Linux System
Step 1. Patches and Updates
Update your server with the latest service packs and patches. You must update and patch all of the Web server components including Windows 2000 or Windows Server 2003 (and IIS), the .NET Framework, and Microsoft Data Access Components (MDAC).
During this step, you:
Detect and install the required patches and updates.
Update the .NET Framework.
Detect and Install Patches and Updates
Use the Microsoft Baseline Security Analyzer (MBSA) to detect the patches and updates that may be missing from your current installation. MBSA compares your installation to a list of currently available updates maintained in an XML file. MBSA can download the XML file when it scans your server or you can manually download the file to the server or make it available on a network server.
Step 2. IISLockdown
The IISLockdown tool helps you to automate certain security steps. IISLockdown greatly reduces the vulnerability of a Windows 2000 Web server. It allows you to pick a specific type of server role, and then use custom templates to improve security for that particular server. The templates either disable or secure various features. Note By default, IIS 6.0 has security-related configuration settings similar to those made by the IIS Lockdown Tool. Therefore you do not need to run the IIS Lockdown Tool on Web servers running IIS 6.0. However, if you are upgrading from a previous version of IIS (5.0 or lower) to IIS 6.0, it is recommended that you run the IIS Lockdown Tool to enhance the security of your Web server.
During this step, you:
Install and run IISLockdown.
Install and configure URLScan.

Step 3. Services
Services that do not authenticate clients, services that use insecure protocols, or services that run with too much privilege are risks. If you do not need them, do not run them. By disabling unnecessary services you quickly and easily reduce the

You May Also Find These Documents Helpful

  • Powerful Essays

    This video briefly discussed windows update. The topics discussed were about security center, control panel access, and the internet explorer access route. The service provides different kinds of updates. Security updates or critical updates protect against vulnerabilities to malware and security exploits. Other updates correct errors unrelated to security, or enhance functionality. Microsoft Office Update was a free online service that allowed users to detect and install updates for certain Microsoft Office products. Windows Update , a service offered by Microsoft, provides updates for the Microsoft Windows operating system and its installed components, including Internet Explorer…

    • 511 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    For the systems/application domain, we must strengthen our servers. This will be done by shutting off access to unused ports and services. This will provide less ways onto our system. Our servers must have the latest patches and…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC342 Assignment5

    • 338 Words
    • 1 Page

    During the first two phases of the five step process of a cyber-attack a hacker conducts reconnaissance of the target network and scans for any vulnerabilities that could be exploited. (EC-Council, 2009) These vulnerabilities are known as a system’s attack surface. One of the core job functions of Network administrators is reducing this attack surface through a process called system hardening. There a number of techniques that can be used to harden Microsoft clients and servers such as scanning the system with nmap to find any vulnerabilities that comes from having open ports. After the initial scan the administrator should close open ports and uninstall unnecessary services. (Solomon, 2014) Administrators should also run follow up scans with nmap to make sure that there are no ports or services that they may have missed during their first run. Nmap is not the only program that can identify vulnerabilities within a server, the SCW utility should also be used when you are installing new server hardware to check for any unwanted services that may be set to run on the server as a default setting. (Solomon, 2014)…

    • 338 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Nt1330 Unit 3 Lab Report

    • 1967 Words
    • 8 Pages

    Create an Apache Web Server installation and perform basic security configurations to assure that the system has been hardened…

    • 1967 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    For the systems/application domain, we must lessen chances for attacks on our servers. This shall be done by figuring out which ports and services are not being used and shutting them off. This gives hackers less ways onto our system. Also needed is to make sure all servers have the latest patches and updates. These updates provide the latest security patches with less likelihood of vulnerabilities.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    Install the server software either on a dedicated host or on a dedicated guest OS if virtualization is being employed.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. With this security plan being implemented, you can monitor inbound IP traffic anomalies and prevent malicious-intent traffic that may try to intrude and harm your system.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IT 286 Week 4 Assignment

    • 1790 Words
    • 5 Pages

    Microsoft is constantly coming out with software updates for its operating systems, supporting programs, and various hardware drivers. Whether you run Windows XP or Windows 7, the one thing you can count on is Microsoft sending updates down the line on a regular basis — at least until the OS falls out of support. Keeping your operating system updated is paramount to long and healthy system operation. Windows is impacted by a nearly infinite…

    • 1790 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1&2 Discussion

    • 379 Words
    • 2 Pages

    Security of web applications first begins with configuring the server itself with strict security in mind. Many will often deploy various layers such as a WAF, IDS, or Mod Security to react in real time to various hacking and threats for HTTP requests. However, securing the entire server and any running services with a high level of security in mind is the first fundamental step to avoid the risk of being hacked or compromised.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 242

    • 658 Words
    • 3 Pages

    Security issues that may threaten system performance could be things such as an unwanted/unauthorized email, which may lead to hackers. Then there is also the possibility of viruses, which will slow down the computer and might enable unwanted access in to private accounts and data.…

    • 658 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Limit what services are running on the server to only what is absolutely needed, use unique id/strong password in combination with principle of least privilege to help prevent unauthorized access, use up-to-date anti-malware software, use firewalls to prevent unauthorized access, use intrusion detection software to monitor for unauthorized access…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    up north fishing

    • 544 Words
    • 3 Pages

    Moving into this new chapter of our organization is a very exciting time. With excitement comes, new risks that need to be researched carefully for our company to be successful. In this report I will give you the information you need to make informed decisions on how to take the next steps, which will make for a successful transition to the new world of on-line shopping.…

    • 544 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Information Technology

    • 765 Words
    • 4 Pages

    The act was implemented in Federal Reserve Board Regulation E which outlined the responsibilities of the customer and of the financial institution. When an EFT error has occurred the responsibility of the customer include:…

    • 765 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Information Technology

    • 7594 Words
    • 31 Pages

    The objective of the Practical Assessment Task is to allow the teacher to directly and systematically observe and evaluate the applied competence of the learner. The PAT comprises the application of knowledge (content, concepts and skills).…

    • 7594 Words
    • 31 Pages
    Powerful Essays
  • Good Essays

    Information technologies

    • 510 Words
    • 3 Pages

    When my brother and I got our first computer, we couldn’t even begin to comprehend the amounts of informations we could access. So we just began using it for benign things, like video games and music. It was already at that point when we realized that this is something revolutionary, something that will not go away in a couple of years. Just ten years ago, I couldn’t imagine anything more advanced than what I had in my room. The first ever computer was the famous ENIAC; it weighed about thirty tons, and was about thirty meters long. And now, ten years later, on my desk there’s a display and a computer in a two foot tablet with more processing speed than what was and is being used in space programs.…

    • 510 Words
    • 3 Pages
    Good Essays