• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

My question to discuss with my classmates

March 13, 2024 by David Lanter 15 Comments

Filed Under: 09 - Host Hardening Tagged With:

Reader Interactions

Comments

  1. Jon Stillwagon says

    March 16, 2024 at 2:26 pm

    Does host hardening and hardening the security system have relatively the same protections or defensive measures when it comes to suspecting a data breach?

    Log in to Reply
    • Celinemary Turner says

      March 19, 2024 at 10:26 pm

      Host hardening focuses on individual devices, while security system hardening encompasses a wider range of security measures to protect the entire security landscape.

      Log in to Reply
  2. Ooreofeoluwa Koyejo says

    March 17, 2024 at 12:33 am

    Is patch management automation sufficient as a response to zero-day vulnerabilities?

    Log in to Reply
    • Yannick Rugamba says

      March 18, 2024 at 8:02 pm

      No, patch management automation alone is insufficient for zero-days. While automating patch deployment is important, zero-days require additional mitigating controls until patches are available and tested, like disabling affected services, using virtual patching, increasing monitoring, etc.

      Log in to Reply
  3. Yannick Rugamba says

    March 17, 2024 at 5:45 pm

    What criteria does your organization use to create standardized secure baselines for hardening different server types?

    Log in to Reply
    • Celinemary Turner says

      March 19, 2024 at 10:31 pm

      Organization uses a combination of industry standards, best practices, and internal expertise to create standardized secure baselines for hardening different server types. The criteria include:
      .1. Industry standards: NIST, PCI DSS, HIPAA, etc.
      2.. Server role and function: web server, database server, file server, etc.
      3.. Operating system and version: Windows, Linux, Unix, etc.
      4.. Security vulnerability and threat analysis

      These criteria help create comprehensive and tailored secure baselines for different server types, ensuring effective protection against various threats and compliance with relevant regulations.

      Log in to Reply
  4. Edge Kroll says

    March 17, 2024 at 7:26 pm

    What are the key steps involved in implementing host hardening measures to enhance the security of devices within an IP network?

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      March 20, 2024 at 12:13 am

      I’d say for host hardening, an effective patch management process should be documented and tested for sufficiency. The patch management process should ensure the timely application of patches released from the software vendors and also have an environment to test the patches before applying them to the production environment. This is to ensure there are no disruptions caused to normal business operations.

      Log in to Reply
  5. Eyup Aslanbay says

    March 17, 2024 at 7:50 pm

    Why do firms have a difficult time applying patches?

    Log in to Reply
    • Celinemary Turner says

      March 19, 2024 at 10:34 pm

      Firms may have a difficult time applying patches for several reasons, including these but not limit to examples below,

      1. Complexity: Patching can be a complex process, requiring significant technical expertise and resources.
      2. Time-consuming: Applying patches can take time, which may be a challenge for organizations with limited IT staff or resources.
      3. Compatibility issues: Patches may not be compatible with all systems or applications, requiring additional testing and validation.

      Log in to Reply
    • Ooreofeoluwa Koyejo says

      March 20, 2024 at 12:16 am

      There are different reasons for this because firms are also quite different in size, structure and operational efficiency. However, some fo the reasons include:
      1. Knowledge and skill required: to apply a patch effectively, the analysts must be aware that the patch is available first and then have the skills/knowledge to apply it without causing more problems.
      2. Resource Availability
      3. Budget constraints
      4. Internal dependencies in enterprise architecture

      Log in to Reply
  6. Celinemary Turner says

    March 17, 2024 at 8:46 pm

    What are the typical steps to secure operating systems and server applications?

    Log in to Reply
    • Eyup Aslanbay says

      March 19, 2024 at 10:53 pm

      1. Regularly updating and patching the system to fix vulnerabilities.
      2. Configuring and strengthening access controls to limit user privileges.
      3. Implementing firewall and antivirus software for threat protection.
      4. Ensuring proper network security configurations.
      5. Regularly backing up data for recovery in case of breaches

      Log in to Reply
  7. Bo Wang says

    March 17, 2024 at 9:40 pm

    What are the factors that threaten the host in the current network environment?

    Log in to Reply
    • Eyup Aslanbay says

      March 19, 2024 at 10:54 pm

      In the current network environment, factors that threaten the host include malware attacks, unauthorized access or hacking, vulnerabilities in software or hardware, insider threats, phishing attacks, DDoS attacks, and zero-day exploits. Additionally, inadequate security policies and poor user practices can also pose significant risks.

      Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in