IS3220lab 10

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 7

Damon Baker (15622970)

June 24, 2015


IS3220
dbaker158@email.itt-tech.edu
Lab 10

Damon Baker (15622970)


June 24, 2015
IS3220
dbaker158@email.itt-tech.edu

Damon Baker (15622970)


June 24, 2015
IS3220
dbaker158@email.itt-tech.edu

Damon Baker (15622970)


June 24, 2015
IS3220
dbaker158@email.itt-tech.edu

Damon Baker (15622970)


June 24, 2015
IS3220
dbaker158@email.itt-tech.edu

Damon Baker (15622970)


June 24, 2015
IS3220
dbaker158@email.itt-tech.edu

Damon Baker (15622970)


June 24, 2015
IS3220
dbaker158@email.itt-tech.edu

1.

What resources are available on the Internet to help system administrators determine how to harden a Windows
Server 2008? Windows 7 workstation? (List at least three resources in your response.)
SCM ( Windows security compliance manager)
MBSA (Microsoft baseline security analyzer)
SCW ( Security configuration wizard)

2.

After an incident responder has finished gathering information about a security incident, what should be the next
step(s)?
Containment should be the next step, then eradication then recovery.

3.

Research US-CERT, FIRST, and similar computer emergency/computer incident response organizations. Choose
one organization and explain its mission, purposes, and services offered. Who does the organization support? What
level of coordination does this organization provide?
This is the United States Computer Emergency Readiness Team and they support the Department of Homeland
Security. It is a 24x7 unit that leverages the Protected Critical Infrastructure Information (PCII) Program to prevent
inappropriate disclosure of proprietary information or other sensitive data.

You might also like