• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2023 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack
  • Zoom Meeting

My question to discuss with my classmates

March 15, 2023 by David Lanter 44 Comments

Filed Under: 09 - Host Hardening Tagged With:

Reader Interactions

Comments

  1. Aayush Mittal says

    March 18, 2023 at 10:12 am

    Explain the benefits of Virtualization in the host hardening process.

    Log in to Reply
    • Shepherd Shenjere says

      March 18, 2023 at 11:57 am

      There are many benefits from virtualization in the host hardening process. One that I can point out is that it reduces labor costs associated with server administration, development, testing, and training considering that you can only create a single security baseline for each server within and enterprise.

      Log in to Reply
    • Nicholas Foster says

      March 18, 2023 at 6:44 pm

      Hi Aayush,

      Host hardening is greatly benefited by virtualization in a number of different ways. Some examples are containerization, sandboxing, and virtual HD encryption. Another tremendous benefit to virtualization is availability/disaster recovery in that quick reinstallation of OS’s and restoration of data helps drive down cost and time required to bring hosts back online.

      Log in to Reply
    • Jill Brummer says

      March 18, 2023 at 8:49 pm

      There are several benefits of virtualization in the host hardening process. A single security baseline can be created for each server, which allows clones of that existing virtual machine in a few minutes instead of hours. In turn, the cloning minimizes the chance of incorrectly configuring a server, reduces the time needed to configure the server, and eliminates the need to install applications, patches, or service packs.

      Log in to Reply
    • Frank Kofi Kpotivi says

      March 19, 2023 at 1:34 pm

      Hi Aayush,
      The usage of virtualizations helps run multiple servers on a single machine, at the same time isolating them from each other .Virtual hard disk encryption is another good way to protect your data.This is more apllicable, when the hard disk is travelling from one location to another .

      Log in to Reply
    • Wei Zhang says

      March 19, 2023 at 11:54 pm

      Reduce capital and operating costs.
      Minimize or eliminate downtime.
      Improve IT productivity, efficiency, agility, and responsiveness.
      Faster configuration of applications and resources.
      Better business continuity and disaster recovery.
      Simplify data center management.

      Log in to Reply
    • Sunam Rijal says

      March 21, 2023 at 1:08 am

      virtualization provides isolation between different virtual machines (VMs) and their applications, which can help contain the impact of security breaches or vulnerabilities. If one VM is compromised, the other VMs on the same host are still protected.
      another benefit is virtualization allows for the segmentation of applications and services into different VMs, which can help limit the impact of security breaches or failures. For example, a web server and database server can be separated into different VMs, reducing the attack surface of each.

      Log in to Reply
    • Asha Kunchakarra says

      March 21, 2023 at 12:10 pm

      It helps run multiple servers on a single machine at the same time isolating them from each other. Virtual hard disk encryption is great way to protect your data. The use of unused physical hardware to the host system must be avoided.

      Log in to Reply
  2. Shepherd Shenjere says

    March 18, 2023 at 11:53 am

    Do you think Microsoft Windows Server is easy to learn as most are made to believe?

    Log in to Reply
    • Nicholas Foster says

      March 18, 2023 at 6:31 pm

      Hi Shepherd,

      I do believe Microsoft’s Windows Server is much easier to learn and digest purely based on two facts. One, it’s nearly all GUI interaction. Whereas it’s competitor Unix is mainly all terminal interaction. Generally speaking, people will take point and click over remembering countless different case sensitive terminal commands. Fact two, Windows server is very similar to the GUI of it’s OS. With Windows being hands down the most widely used OS to date “accounting for 70.39 percent share of the desktop, tablet, and console OS market in January 2023” avid users of their OS will find Windows Server nearly identical in a lot of ways.

      https://www.statista.com/statistics/268237/global-market-share-held-by-operating-systems-since-2009/#:~:text=Microsoft%27s%20Windows%20is%20the%20most,OS%20market%20in%20January%202023.

      Log in to Reply
    • Jill Brummer says

      March 18, 2023 at 8:56 pm

      Yes, I believe Microsoft Windows Server is easy to learn. All recent versions of Windows Server have user interfaces that look like the interfaces in client version of Windows. Certain versions come with many of the same applications found on the client version of Windows. Additionally, the Start menu has most choices that are familiar to desktop users. In addition to these familiarity items, there are also many tools and resources available to assist in learning Windows Server.

      Log in to Reply
    • David Vanaman says

      March 19, 2023 at 11:12 am

      I think the entry level use of Windows server is quite easy to learn. Windows Server has the advantages of being similar to the general purpose Windows OS that most people are familiar with as well as an intuitive GUI interface.

      Linux on the other hand has a steep initial learning curve. It is not as user friendly nor does it have a polished user interface. However, I think Linux has the advantage in learning more than just the entry level administration. The command line interface, strict syntax for input, and very technical ways that an administrator has to learn to interface with the OS initially make that administrator more familiar with the deeper workings. When transitioning into more complex administrative tasks, the junior admin can transition those skills into complex tasks.

      Advanced Windows Server administration on the other hand means breaking habits ingrained by the simple user interface and GUI options. transitioning from junior admin to more complex admin work requires unlearning the “simple” ways to do things to get into the deeper levels of Windows administration. Unlike the basic user interface, Microsoft doe snot put effort into ensuring that the background and underlying processes and interfaces have any uniformity. There are often multiple ways to do something that are similar but not quite the same in how they effect the operation of the server.

      Log in to Reply
    • Asha Kunchakarra says

      March 21, 2023 at 12:12 pm

      Yes I think that Microsoft windows server is easy to learn. Compared to older systems like linux, it is built with a lot less features and is more simplified. Many computers use this OS and it is quite user friendly.

      Log in to Reply
  3. Mengqi Xiong says

    March 18, 2023 at 4:33 pm

    What critical recommendations does NIST 800-123 provide for host hardening and how could use these ideas to identify weaknesses in the server environment?

    Log in to Reply
    • Shadrack Owusu says

      March 19, 2023 at 11:18 pm

      Recommendations for administrators by NIST 800-123 for host hardening are
      a) Remove unnecessary services, applications, and network protocols.
      b) Configure OS user authentication.
      c) Configure resource controls appropriately.

      The ideas can be used to identify weaknesses in the server environment when administrators consider configuring the OS to act as a bastion host. A bastion host has strong security controls and is configured so as to offer the least functionality possible.

      Log in to Reply
  4. Nicholas Foster says

    March 18, 2023 at 6:23 pm

    It’s fairly common knowledge that Unix hosting offer tremendous stability, compatibility, and performance, handling high server loads generally better coupled with the fact that web servers designed to run on Unix generally are compatible with Windows but not vice versa and much fewer restarts compared to Windows. It seems the only true benefit to using Windows would be developing in .NET, VB, or some other app that is limiting your option to Windows. Do you think Windows will ever be able to catch up to Unix and bridge these gaps?

    Log in to Reply
    • Pranavi Yadalam Sekhar says

      March 18, 2023 at 8:48 pm

      The specific requirements of the organization and the workloads being executed on the system will determine whether Unix or Windows should be used. Windows Server can be the ideal choice for businesses that need to be able to use specific apps or development frameworks that are only compatible with Windows. Unix-based systems might be a better choice for enterprises that want high levels of stability, performance, and scalability.

      Log in to Reply
    • David Vanaman says

      March 19, 2023 at 11:21 am

      Linux has a lot of advantages that you mentioned, but you need a solid admin team of trained Linux experts.

      Windows Server has different advantages. The first is that it is easily accessible. Because it is so similar to the Windows that powers most workstations and laptops, it is easier to get junior admins familiar with it. It is also easier to make non-IT folks comfortable with it and it comes with a warranty and support. Never underestimate those two items when it comes to selling to executives: familiar and a warranty go a long way!

      When developing complex software products, the Windows ecosystem is easier to work with and ensure that your customers will have a compatible system. Windows also has a much larger driver ecosystem. There are so many existing and vendor supplied libraries or drivers that would need to be written from scratch for a Linux environment.

      Log in to Reply
  5. Pranavi Yadalam Sekhar says

    March 18, 2023 at 8:35 pm

    What is the name of Microsoft’s sever operating system? What security protections do recent version of this operating system offer?

    Log in to Reply
    • Jill Brummer says

      March 18, 2023 at 9:21 pm

      The name of Microsoft’s most recent server operating system is “Windows Server 2019”. Some security protections this version offers are a patching cadence, .NET updates, advanced threat protection, and windows defender ATP exploit guard.

      Log in to Reply
      • David Vanaman says

        March 19, 2023 at 11:23 am

        Microsoft has a Windows Server 2022 out that is newer than Server 2019, but it hasn’t gotten wide adoption yet. My limited experience with Server 2022 is that is does not have a lot of as yet obvious advantages over Server 2019, hence the slow adoption.

        Log in to Reply
    • Nishant Shah says

      March 19, 2023 at 8:35 pm

      Microsoft’s latest server edition is Windows Server 2022. Some of the security features in Server 2022 are:

      Secured core server
      Hardware root-of-trust
      Firmware protection
      UEFI secure boot
      Virtualization-based security (VBS)
      HTTPS and TLS 1.3 enabled by default
      Encrypted DNS name resolution requests with DNS-over-HTTPS
      SMB AES-256 encryption

      Log in to Reply
  6. Shadrack Owusu says

    March 19, 2023 at 3:03 pm

    a)Name any four (4) types of vulnerability fixes.
    b)Discuss any two (2) of the above.
    c)State two advantages and disadvantages of version upgrades.

    Log in to Reply
  7. Nishant Shah says

    March 19, 2023 at 8:30 pm

    What are some obstacles one could face while patching a server?

    Log in to Reply
    • Shadrack Owusu says

      March 19, 2023 at 11:01 pm

      some obstacles one could face while patching a server are
      a) Reduced functionality, which might not be justified given the degree of added safety offered by a patch.
      b) Some patches can actually freeze machines or do other damage. This is undesirable especially if a patch has no uninstall option.

      Log in to Reply
    • Chinenye Marylyn Akinola says

      March 20, 2023 at 4:22 am

      Some of the obstacles could include the following amongst others;
      1) Problem of availability: Lack of access to thorough reports varies depending on the system you are using, which is a typical issue for many firms. Lack of detail in patching reports can put your entire infrastructure, as well as a number of devices and applications, at danger. And this can turn out to be disastrous if your company must adhere to strict industry compliance standards.
      2) Unexpected patch failures: The majority of patch management systems aren’t built with the ability to anticipate situations that can cause a patch to fail. Patch failure happens when a patch becomes corrupt, leaving the system vulnerable to attacks and vulnerabilities.
      3) Vulnerability management.

      Log in to Reply
    • Aayush Mittal says

      March 20, 2023 at 12:57 pm

      -> A small company might not want to deploy every patch. Patching only highly prioritized vulnerabilities doesn’t solve the problem entirely.
      -> IT and security professionals find patching complex and time-consuming. A small company would find so because the process involves, continually identifying and assessing vulnerabilities, monitor and testing patches, and deploying the patches to their systems.

      Log in to Reply
    • Mengqi Xiong says

      March 20, 2023 at 11:03 pm

      Some of the common obstacles or challenges that network administrators may face when patching servers include downtime, software compatibility, system setup or configuration, priority management of vulnerabilities, and more. Network administrators need to carefully plan and test the patching process, ensure that all necessary resources are available, and develop contingency plans in case of problems or unplanned downtime.

      Log in to Reply
    • Sunam Rijal says

      March 21, 2023 at 1:04 am

      some obstacles that one could face while patching a server are:
      1. compatibility issues: Patching the server can cause compatibility issues with other software and hardware components, which may result in system instability or downtime.
      2. Lack of patching discipline: Failing to patch servers in a timely manner can leave them vulnerable to cyber attacks and other security threats. It’s important to establish a patching schedule and adhere to it consistently to ensure that servers remain up to date and secure.

      Log in to Reply
    • Asha Kunchakarra says

      March 21, 2023 at 12:13 pm

      1. Lack of inventory management
      2. Too many patches to update so there is no desire to do all of them
      3. failures in patching
      4. vulnerability management

      Log in to Reply
    • Shepherd Shenjere says

      March 21, 2023 at 12:22 pm

      It may freeze the system or reduce the functionality.

      Log in to Reply
  8. Parmita Patel says

    March 19, 2023 at 8:55 pm

    How can network admin improve their process for implementation to better prepare for vulnerabilities?

    Log in to Reply
    • Abayomi Aiyedebinu says

      March 19, 2023 at 10:25 pm

      Hi Parmita,
      There is no silver bullet that will eliminate the growing list of vulnerabilities. But IT security professionals can address their current vulnerability exposures and prepare an adequate defense by proactively defining and executing a plan that follows industry best practices and leverage automated technologies that makes the plan repeatable.

      Log in to Reply
    • Sunam Rijal says

      March 21, 2023 at 1:11 am

      Some ways that network admin improves their process for implementation to better prepare for vulnerabilities are:
      – conduct regular vulnerability assessment
      – implement patch management process
      – network segmentation
      – monitoring and logging network activity
      – awareness program

      Log in to Reply
  9. Abayomi Aiyedebinu says

    March 19, 2023 at 10:23 pm

    Why is it important to keep log files for audit purposes?

    Log in to Reply
    • Shadrack Owusu says

      March 19, 2023 at 10:59 pm

      It is important to keep log files for audit purposes because log files can be analyzed in real-time or saved for later analysis and hence violations of authentication and authorization policies are likely to be common without auditing,

      Log in to Reply
    • Wei Zhang says

      March 19, 2023 at 11:59 pm

      Having a detailed audit log helps companies monitor data and track potential security breaches or internal misuse of information. Logs also contain detailed historical information that can be used to reconstruct a timeline of system outages or events.

      Log in to Reply
    • Chinenye Marylyn Akinola says

      March 20, 2023 at 4:25 am

      Companies can monitor data and maintain track of any security breaches or internal information misuses by keeping thorough audit logs. They aid in preventing and locating fraud as well as ensuring users adhere to all outlined rules.

      Log in to Reply
  10. Sunam Rijal says

    March 19, 2023 at 11:11 pm

    How do you think implementing role-based access control can enhance server security, and what potential challenges might organizations face when trying to implement this control measure?

    Log in to Reply
    • Aayush Mittal says

      March 20, 2023 at 1:14 pm

      RBAC restricts user access to the minimum levels required to perform a job. This helps organizations enforce security best-practices like the principle of least privilege which minimizes the risk of data breaches and data leakage. RBAC limits the impact by shrinking the attack surface.
      To establish granular policies, administrators need to keep adding more roles which can very easily lead to “role explosion” and requires administrators to manage multiple roles as per organizational needs.

      Log in to Reply
  11. Wei Zhang says

    March 19, 2023 at 11:40 pm

    IOS updates so frequently, do you update every time? Do you think not updating will cause information leakage?

    Log in to Reply
    • Aayush Mittal says

      March 20, 2023 at 1:20 pm

      OS updates include vital security patches for newly found system vulnerabilities, bug fixes and new features. These are vulnerabilities that hackers know about and are busy exploiting with malware and other malicious threats. If a patch for that vulnerability has been issued through an update, but never applied, it leaves your device wide open to hackers.
      We do tend to delay updates because of we are afraid that the update will mess something up or are unsure how long the update will take and don’t want to risk the time and interrupt our ongoing tasks. However, the OS updates are tested and then published for general public.

      Log in to Reply
    • Mengqi Xiong says

      March 20, 2023 at 10:41 pm

      Updates to iOS often include bug fixes, security enhancements, and other improvements that help protect devices and user information from potential threats. Not updating your operating system can leave your device vulnerable to security threats such as malware, viruses, or hackers. These threats may gain access to personal information, compromise data integrity, or cause other forms of harm. However, as far as my personal experience is concerned, sometimes new updates introduce new bugs or issues, and although iOS sometimes provides a channel to roll back the system, there is still a risk of data loss.

      Log in to Reply
  12. Asha Kunchakarra says

    March 21, 2023 at 12:03 pm

    What is the importance of server security planning?

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (5)
Fox School of Business

Copyright © 2023 · Course News Pro on Genesis Framework · WordPress · Log in