Thursday, October 10, 2019
Polynomial Essay
à © ITT Educational Services, Inc. All Rights Reserved. -Change Date: 01/24/2011 Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1ââ¬â2 pages Self-Assessment Checklist I have recommended the appropriate kernel that can be used by the organization. I have explained the advantages and disadvantages of using each of the kernel options with a valid rationale. Project Part 3 Task 2: Recommend a Software Management Plan Scenario The original task team at First World Bank Savings and Loan has concerns about the support and software management of the organizationââ¬â¢s Linux-based infrastructure. The team wants you to recommend a software m anagement plan keeping in mind the various servers and the cost. Tasks You need to: Make a recommendation for a software management plan. Consider options available from the open source community and from vendors. If you select aà vendor, specify the software it will support and how it will support. Explain the need to install anti-virus software on Linux servers providing a rationale in support of your answer. Summarize a plan for applying patches and security updates to the Linux system. Submission Requirements Format: Microsoft Word IS3440 Linux Security STUDENT COPY: Project à © ITT Educational Services, Inc. All Rights Reserved. -Change Date: 01/24/2011 Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1ââ¬â2 pages Self-Assessment Checklist I have recommended a suitable software management plan.à I have explained the need to install anti-virus software on Linux servers.à I have explained how to manage critical and noncritical security-related updates. Project Part 3 Task 3: Monitor Logs and Baseline Scenario The task team at First World Bank Savings and Loan wants you to research appropriate monitoring tools for the organizationââ¬â¢s Linux-based tiered infrastructure. Tasks You need to: Summarize the benefits of remote logging. Recommend tools for: o Alerting administrators when files in the operating system have changed. o Checking for rootkits. o Checking for new open ports, files, and system resources.à Explain how logwatch can be configured toà deliver a daily report from each serverà summarizing events found in log files.à Recommend a schedule and a software application or service to periodically scan the servers to satisfy Payment Card Industry (PCI) Data Security Standard (DSS) compliance requirements. Submission Requirements IS3440 Linux Security STUDENT COPY: Project à © ITT Educational Services, Inc. All Rights Reserved. -Change Date: 01/24/2011 Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1ââ¬â2 pages for the project task; 2ââ¬â3 pages for the executive summary Self-Assessment Checklist for Project Part 3 Task 3 I have recommended a file integrity checker and explained the purpose of a rootkit checker. I have explained the use of common GNUââ¬â¢s Not UNIX (GNU) utility tools. I have described the configuration of logwatch and recommended a service or tool for periodic server scans.à Self-Assessment Checklist for Project Part 3: Executive Summary I have recommended appropriate kernel options for the organization and explained the pros and cons of each option.à I have described the importance of a software management plan. I have explained the use of installing anti-virus software on Linux servers. I have summarized monitoring and logging techniques used in a typical Linux infrastructure. I have described the importance of a suitable backup plan, while maintaining data confidentiality using encryption. Project Part 4 Task 1: Design a Backup Planà For the various servers that are part of First World Bank Savings and Loanââ¬â¢s Linux-based infrastructure, you have to research and design a backup plan using open source and commercial software. You can create the design based on your discussions with peers in Unit 10 Discussion 1 titled ââ¬Å"Creating a Backup Plan.â⬠Tasks You need to: IS3440 Linux Security STUDENT COPY: Project à © ITT Educational Services, Inc. All Rights Reserved. -Change Date: 01/24/2011 Recommend software, both open source and commercial, to use for the backup plan. Explain reasons for your recommendation. Recommend a design of the backup plan. Answer the following questions: Will you use a dedicated server or a service provider for backups?à Will backups be stored on hard disks,à tape media, or any other media? Who will be responsible for verifying backups and restoring data? Summarize the need for encrypting backup data. Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1ââ¬â2 pages for the project task; 3ââ¬â5 pages for the executive summary Self-Assessment Checklist for Project Part 4 Task 1 I have recommended open source and commercial software options for the backup. I have designed a plan for full and incremental backups and explained the need for encrypting backup data.à I have designed a process for backup verification and restoring. Self-Assessment Checklist for Project Part 4: Executive Summary of the Project I have demonstrated how to secure a Linux platform using installed commands and other available open source software. I have explained the use of bastion hosts to secure architecture design. I have examined best practices to mitigate security risks to a Linux server using a suitable software management plan.à I have demonstrated the use of a layered security approach on Linux servers. I have described backup, recovery, and incident response in a Linux architecture. IS3440 Linux Security STUDENT COPY: Project
Subscribe to:
Post Comments (Atom)
8 Ways to Tell If a Website Is Reliable
8 Ways to Tell If a Website Is Reliable For each legitimate site, there are handfuls crammed with data that is wrong, problematic or down...
-
Wandered Lonely as a Cloud' Poem William Wordsworth wrote Daffodils on a stormy day in spring, while walking along with his sister Dorot...
-
' ravishing copper begins with well behaved health. It unavoidably amiable business and protection. What you bustt kip down p...
-
It is very easy to find some(prenominal) sort of information in the books or internet sites, which can be helpful for those students, who ...
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.