Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
Purpose
The purpose of the first lab is to learn how to secure operating systems
Purpose
The purpose of the first lab is to learn how to secure operating systems running Microsoft Windows and Linux. You will learn how to use Netplwiz to secure the Windows logon process and how to review settings in the group policy management console and security logs in the Windows event viewer. Finally, you will modify iptables commands to secure Linux systems. In the second lab you will be working with Linux to brute force SSH and use dangerous Linux commands such as dd and ncrack to simulate a hard drive attack and a password cracking attack.
Instructions
Answer the following questions. Conduct research and cite supporting sources in APA format where appropriate. Make sure to inlude introduction and conclusion
Describe how the dd command is used in the lab and why dd is a dangerous Linux command. In addition list and describe two other dangerous linux commands.
List and discuss two common SSH security risks. Describe how you would avoid and mitigate each of these risks.
What do the events information, audit success, audit failure, warning, and error mean in the context of windows logs. List and describe any two event codes that you would monitor for Windows security logs and why?
Research iptables firewall rules and write and describe a rule that would drop all SSH connections from a specific IP address.
Write an iptables firewall rule that will allow established and related incoming traffic. Describe what this rule does and why it is not considered a security risk.
In the last step in the lab (Implementing Security Policies on Windows and Linux), why is only port 80 open on 192.168.1.30. What iptables rule would open 192.168.1.30 for http, https, and ssh connections?
Requirements
Prepare the written portion into a Microsoft® Word® document. Support any assertions made with credible sources using APA style formatting.
For more information on APA style formatting, go to Academic Writer in the Academic Tools area of this course.
Also review the university policy on plagiarism. If you have any questions, please contact your professor.
Plagiarism
Plagiarism is an act of academic dishonesty. It violates the University Honor Code, and the offense is subject to disciplinary action. You are expected to be the sole author of your work. Use of another person’s work or ideas must be accompanied by specific citations and references. Whether the action is intentional or not, it still constitutes plagiarism.
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount