• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2023 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

Boyle and Panko Chapter 7 Host Hardening

January 1, 2022 by Jose Gomez 1 Comment

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 5b - Host Hardening Tagged With:

Reader Interactions

Comments

  1. Yi Liu says

    March 4, 2024 at 12:12 am

    Host Hardening emphasizing the critical nature of protecting individual servers and hosts beyond firewall protection. The chapter begins by defining a “host” as any device with an IP address that can be networked, including servers, clients, routers, firewalls, and mobile phones. Given that servers installed with default settings are highly vulnerable to attacks, host hardening is the necessity.
    Key elements of host hardening include regular backups, restricting physical access, using secure configuration options during operating system installation, minimizing the number of running applications and services to reduce attack surfaces, and updating software to patch known vulnerabilities. The text also covers the management of users and groups, secure access permissions, data encryption, the use of host firewalls, regular review of operating system logs, and frequent vulnerability testing.
    security baselines and images are sets of specific actions taken to harden hosts of a particular type or version. These serve as a checklist to ensure no step is overlooked during the hardening process. Companies might also use disk images of securely configured systems for future installations, ensuring consistency and adherence to security policies.
    The conclusion emphasizes the host as the last line of defense in thwarting attacks, highlighting the importance of hardening not just servers and network devices but also client PCs and mobile phones.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in