• Home
  • Blog
  • Instructions The purpose of this lab is to recognize the risks, threats, and vul

Instructions The purpose of this lab is to recognize the risks, threats, and vul

0 comments

ORDER YOUR PAPER AND GET QUALITY FOR YOUR MONEY

InstructionsThe purpose of this lab is to recognize therisks, threats, and vulnerabilities commonly found in the workstation domain.You will identify known vulnerabilities and exploits on the CommonVulnerabilities and Exposures (CVE) database listing. You will describe howrisks, threats, and vulnerabilities or misconfigurations at the operatingsystem level in the workstation domain might expose that workstation. You willalso identify steps to harden the workstation domain operating system andapplications installed on the user’s workstation for compliance andsafeguarding of sensitive data and access to that data.Finally, you will apply Department of Defense(DoD) guidelines for securing the workstation domain, including the review andassessment of Windows 10 and Windows 2016 security guidelines. Participatein each section of the lab and follow the instructions for the exercises ineach section. You will use a text document to develop your homework assignmentby completing the sections listed below:Lab 5.1aReview the following scenario:You are a security consultantfor an information systems security firm and have a new healthcare providerclient under the Health Insurance Portability and Accountability Act (HIPAA)compliance. Your new client wants to know the requirements and business driversfor securing the workstation domain in its healthcare environment. Your newclient requires compliance with HIPAA. Similarly, your firm has a DoD clientthat also wants you to perform a workstation domain compliance audit per DoDworkstation hardening guidelines and baseline requirements.In your homework assignment,discuss how the compliance law requirements and business drivers for thehealthcare provider’s workstation domain might differ from the DoD’sworkstation domain security compliance requirements.Lab 5.1bLaunch your Web browser. Navigate to thefollowing website: http://cve.mitre.org.Review the site, and then in your homework assignment, identify the risks,threats, and vulnerabilities commonly found in the workstation domain.Launch your Web browser. Navigate to thefollowing website: https://public.cyber.mil/stigs/.Review the Security Technical Implementation Guides (STIGs) available and theproper implementation of security based on DoD’s workstation/desktop hardeningguidelines.In your document, discuss three STIGs and theDoD’s workstation/desktop hardening guidelines.Lab 5.1cLaunch your Web browser. Navigate to thefollowing website: https://public.cyber.mil/stigs/Search for the ‘Desktop Application’ SecurityTechnical Implementation Guide (Version 4, Release 5) document from the STIGdatabase website.Review the following concepts from thisoverarching DoD standards document and, in your homework assignment, discussthe significant points of two of thesetopics:Appropriate backup strategy does not existPublic instant message clients are installedPeer-to-Peer clients or utilities are installedExecution Restricted File Type PropertiesOpen-restricted File Type PropertiesYou can view the contents of the STIG byvisiting the following site: https://vaulted.io/library/disa-stigs-srgs/desktop_applications_generalLab 5.1dLaunch your Web browser. Type the followingWeb address: https://public.cyber.mil/stigs/Using the search tool search for and reviewMicrosoft Windows Firewall STIG and Advanced Security. View the STIG. Determinewhich technical controls are appropriate for the Windows OS.Note these in your text document.The STIGs Master List (A to Z) link can befound at this link: https://public.cyber.mil/stigs/downloads/.Scroll down the list to locate and thendownload the following Windows OS security guideline documents/zip files:Windows 10 STIG (youwill see several Windows 10 STIG options; click the one with only a Version number and a Release numberafter STIG).Windows 2016 STIG (youwill see a couple of Windows 2016 STIG options; click the one with only a Version number and a Release numberafter STIG).Once you have downloaded the Windows 10 STIGZIP file to your desktop, double-click the ZIP file to extract the Windows 10STIG folder. Double-click the folder to open it, double-click the Windows 10Manual STIG ZIP file to extract the Windows 10 Manual STIG folder, double-clickthe folder to open it, and then double-click the Windows 10 STIG Manual XMLfile to open it. For help in viewing an XML file, watch the this video on How to Easily View a STIG XML fileIn your Microsoft Word document, identify atleast five security areas that the Windows 10 and Server 2016 STIGs identifiesas critical that would fix the issue. Discuss the critical areas and how theywere mitigated.Lab 5.1eNavigate to the following website: http://cve.mitre.org/Review the National Cyber Security Division ofthe U.S. Homeland Security Department’s CVE listing hosted by the MitreCorporation. To access the CVE listing, click CVE List in the left-hand columnto reach the CVE List main page. In your homework assignment, discuss howworkstation domain OS and application software vulnerabilities are housed inthe CVE listing. Next, click the National Vulnerability Database link on the CVEhomepage or CVE List main page. In your text document, discuss howvulnerabilities are housed in the National Vulnerability Database.Discuss how this is both a security controltool and an attack tool used by hackers.Lab 5.2Write an executive summary to discuss the topworkstation domain risks, threats, and vulnerabilities, and include adescription of the risk mitigation tactics you would perform to audit theworkstation domain for compliance. Use the U.S. DoD workstation hardeningguidelines as your example for a baseline definition for compliance.Submit the document to your instructor as adeliverable for this homework assignment.NOTE: When you submit your homeworkassignment, you can combine the assignments into one document for grading.Please clearly mark the answers for Lab 5.1a, Lab 5.1b, Lab 5.1c, Lab 5.1d, Lab5.1e, Lab 5.1f and Lab 5.2 within your submission by labeling those sectionswithin your homework assignment.Your homework assignment should be a minimumof three pages in APA format. Include a minimum of two sources

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}