• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.005 ■ Spring 2021 ■ Wade Mackey
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Participation
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Cyberattack: The Maersk Global Supply-Chain Meltdown
    • Team Project – Updated 3/31/2020
  • Harvard Coursepack
  • Gradebook

My question to discuss with my classmates

March 12, 2020 by Wade Mackey 24 Comments

Filed Under: 09 - Host Hardening Tagged With:

Reader Interactions

Comments

  1. Numneung Koedkietpong says

    March 13, 2020 at 9:55 pm

    What are the good OS security baselines that you would recommend to client to apply?

    Log in to Reply
    • Percy Jacob Rwandarugali says

      March 14, 2020 at 6:46 pm

      Hi Neung,
      The following basic steps are necessary to secure the OS and can be found in chapter 4 of NIST SP 800-123 for details;

       Patch and update the OS
       Harden and configure the OS to address security adequately
       Install and configure additional security controls, if needed
       Test the security of the OS to ensure that the previous steps adequately addressed all security issues.
      The combined result of these steps should be a reasonable level of protection for the server’s OS.

      Log in to Reply
  2. Percy Jacob Rwandarugali says

    March 14, 2020 at 6:16 pm

    What do you think is the common mistake admins make while trying to secure servers?

    Log in to Reply
    • Akshay Shendarkar says

      March 14, 2020 at 11:43 pm

      In my experience, system administrators tend to the default passwords. Even if the passwords are changed they are common dictionary words and these passwords are shared by multiple personnel as usually a server would have a single admin account.

      Log in to Reply
  3. Akshay Shendarkar says

    March 14, 2020 at 11:42 pm

    As an IT Auditor, how do you know the host hardening methodology/checklist used by system administrators during implementation of a new system is correct?

    Log in to Reply
    • Zeynep Sahin says

      March 16, 2020 at 10:58 pm

      Hi Akshay,
      Host hardening provides various types of protection of any system including physical level, OS level or host level. For example, OS hardening compose of some activities including configuring OS securely, updating, creating rules and policies to enable information security management, and removing or disabling unnecessary application and services. IT auditors should compare organizations’ hardening practices with organizations’ policies to ensure they compliant with the policy requirements.

      Log in to Reply
  4. Zeynep Sahin says

    March 15, 2020 at 12:25 pm

    Why do unnecessary services, applications and network protocols represent as security vulnerability?

    Log in to Reply
    • Imran Jordan Kharabsheh says

      March 16, 2020 at 9:57 pm

      Hello,
      An excellent question, and one that was actually well covered in the NIST 800-123 publication titled “Guide to General Server Security”. In general, services, applications and network protocols that are not actively used to conduct business or in any key processes are seen as an unnecessary risk due to the fact that they can potentially be turned against the company as attack vectors by people with ill-intentions. It should also be noted that every additional service, application and network protocol the organization is willing to take on has its own risk environment that needs to be considered, and sometimes the benefit they provide to the company won’t outweigh the costs associated with securing them.

      Log in to Reply
  5. Christopher James Lukens says

    March 15, 2020 at 5:55 pm

    What is the biggest factor a company should consider when planning to deploy a server?

    Log in to Reply
    • Alexander Reichart-Anderson says

      March 17, 2020 at 1:49 am

      I couldn’t guess exactly because I feel this is quite scenario based. Certainly disk size, power, and purpose would all come into play. Then there is also the purpose of the server and how it communicates with the other information assets in the organization.

      Log in to Reply
  6. Innocent says

    March 15, 2020 at 5:57 pm

    What type of testing is used to ensure that separately developed software modules properly exchange data and how is it done?

    Log in to Reply
    • Zeynep Sahin says

      March 16, 2020 at 10:10 pm

      Hi Innocent,
      Interface testing is used to ensure that separately developed software modules properly exchange data. Interface testing is a type of software testing which ensures communication between two different software systems is done in a right way. Software modules are tested to make sure that they meet Interface specifications and they exchange data properly.

      Log in to Reply
  7. Junjie Han says

    March 15, 2020 at 6:08 pm

    What are some common server setup problems? Can you provide some real cases?

    Log in to Reply
    • Christopher James Lukens says

      March 17, 2020 at 10:21 am

      One real example I experienced was a server set up with the wrong RAID settings. The server OS was configures on logical drive 1 which was configured using RAID-0 which allows for fast speeds and max storage but provides no parity or ability to restore if a drive fails. Logical drive 2 was set up in raid-5 which allows for a RAID array to rebuild itself if a hard drive fails. In my case logical drive 1 failed and the OS was unable to be restored onto the server which was a licensing server that engineers connected to and they couldn’t work. We ended up having to rebuild the whole server from back ups rather that just be able to put a new drive in the server and allow it to rebuild itself. Logical drive 1 should have been built in Raid 5.

      Log in to Reply
      • Junjie Han says

        March 17, 2020 at 7:02 pm

        Great example. Be an IT auditor. It made me aware of the need for temporary backup and restore assistance when a drive fails. You also need to pay attention to the ability of the logical drive to rebuild all RAID.

        Log in to Reply
  8. Natalie Dorely says

    March 15, 2020 at 9:25 pm

    Do you believe patching alone is an efficient security tool?

    Log in to Reply
    • Sarah Puffen says

      March 17, 2020 at 10:11 am

      Patching is crucial but should not be the only method of security. Some patches can possibly have an adverse effect on a system and should not always be implemented right away without testing, so businesses should consider adding another layer of security in addition to host hardening.

      Log in to Reply
  9. Joseph Nguyen says

    March 15, 2020 at 10:09 pm

    Do you think virtualizing servers can make them more secure?

    Log in to Reply
    • Christopher James Lukens says

      March 17, 2020 at 10:26 am

      Great question, I think that virtualization of servers allows for a more efficient use of resources but the virtual server itself still needs to be set up with the same settings as if you had dedicated actual hardware to the server. In addition you need to also properly configure the hypervisor to ensure the server works securely.

      Log in to Reply
  10. Sarah Puffen says

    March 15, 2020 at 10:29 pm

    Other than host-based, what are some other types of controls that can be used to protect a server?

    Log in to Reply
  11. Alexander Reichart-Anderson says

    March 16, 2020 at 12:04 am

    In my classes and internships, I have used many virtual machines. How do you all feel about using virtual machines and the security of them?

    Log in to Reply
    • Peiran Liu says

      March 25, 2020 at 11:31 am

      Virtual Machines seem safe for me. Although they could be copied without any permission, as long as you set a password in the virtual machine, they cannot access your vm. And if you want to share your vm to others, it will also be easy as it is just a file. It is really convenient and safe from my perspective.

      Log in to Reply
  12. Imran Jordan Kharabsheh says

    March 16, 2020 at 1:47 am

    What examples of inwardly-facing servers can you think of should apply the NIST 800-123 guidelines?

    Log in to Reply
  13. Peiran Liu says

    March 18, 2020 at 9:24 am

    How can I make sure that the newly installed system can be hardened properly by current guidelines?

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (6)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in