Host Hardening-ITT-307

Host Hardening-ITT-307

Host Hardening-Protecting the host through the process of hardening is a key skill.

Using a GCU-provided virtual machine:

  1. Develop a plan for hardening your VM to minimize systems risks, threats, and vulnerabilities using best practices of secure programming. Make sure to identify specific design principles that could be violated and the appropriate defensive steps or countermeasures to be taken.
  2. Then, describe the basic secure design fundamentals that will create a trusted computing platform.
  3. Include at least seven  hardening techniques as discussed in the assigned textbook readings, and also identify the type of control that you are implementing.
  4. Implement the plan on your VM.
  5. As you go, take instructional notes and screenshots that will help to reproduce your process using the “Report Template,” located in Class Resources.

APA format is not required, but solid academic writing is expected.

Answer Preview-Host Hardening-ITT-307

Host Hardening-ITT-307

$30.00

Posted

in

by

Tags: