Sunday, September 29, 2019

Polynomial Essay

 © ITT Educational Services, Inc. All Rights Reserved. -Change Date: 01/24/2011 Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1–2 pages Self-Assessment Checklist I have recommended the appropriate kernel that can be used by the organization. I have explained the advantages and disadvantages of using each of the kernel options with a valid rationale. Project Part 3 Task 2: Recommend a Software Management Plan Scenario The original task team at First World Bank Savings and Loan has concerns about the support and software management of the organization’s Linux-based infrastructure. The team wants you to recommend a software m anagement plan keeping in mind the various servers and the cost. Tasks You need to: Make a recommendation for a software management plan. Consider options available from the open source community and from vendors. If you select a  vendor, specify the software it will support and how it will support. Explain the need to install anti-virus software on Linux servers providing a rationale in support of your answer. Summarize a plan for applying patches and security updates to the Linux system. Submission Requirements Format: Microsoft Word IS3440 Linux Security STUDENT COPY: Project  © ITT Educational Services, Inc. All Rights Reserved. -Change Date: 01/24/2011 Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1–2 pages Self-Assessment Checklist I have recommended a suitable software management plan.  I have explained the need to install anti-virus software on Linux servers.  I have explained how to manage critical and noncritical security-related updates. Project Part 3 Task 3: Monitor Logs and Baseline Scenario The task team at First World Bank Savings and Loan wants you to research appropriate monitoring tools for the organization’s Linux-based tiered infrastructure. Tasks You need to: Summarize the benefits of remote logging. Recommend tools for: o Alerting administrators when files in the operating system have changed. o Checking for rootkits. o Checking for new open ports, files, and system resources.  Explain how logwatch can be configured to  deliver a daily report from each server  summarizing events found in log files.  Recommend a schedule and a software application or service to periodically scan the servers to satisfy Payment Card Industry (PCI) Data Security Standard (DSS) compliance requirements. Submission Requirements IS3440 Linux Security STUDENT COPY: Project  © ITT Educational Services, Inc. All Rights Reserved. -Change Date: 01/24/2011 Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1–2 pages for the project task; 2–3 pages for the executive summary Self-Assessment Checklist for Project Part 3 Task 3 I have recommended a file integrity checker and explained the purpose of a rootkit checker. I have explained the use of common GNU’s Not UNIX (GNU) utility tools. I have described the configuration of logwatch and recommended a service or tool for periodic server scans.  Self-Assessment Checklist for Project Part 3: Executive Summary I have recommended appropriate kernel options for the organization and explained the pros and cons of each option.  I have described the importance of a software management plan. I have explained the use of installing anti-virus software on Linux servers. I have summarized monitoring and logging techniques used in a typical Linux infrastructure. I have described the importance of a suitable backup plan, while maintaining data confidentiality using encryption. Project Part 4 Task 1: Design a Backup Plan  For the various servers that are part of First World Bank Savings and Loan’s Linux-based infrastructure, you have to research and design a backup plan using open source and commercial software. You can create the design based on your discussions with peers in Unit 10 Discussion 1 titled â€Å"Creating a Backup Plan.† Tasks You need to: IS3440 Linux Security STUDENT COPY: Project  © ITT Educational Services, Inc. All Rights Reserved. -Change Date: 01/24/2011 Recommend software, both open source and commercial, to use for the backup plan. Explain reasons for your recommendation. Recommend a design of the backup plan. Answer the following questions: Will you use a dedicated server or a service provider for backups?  Will backups be stored on hard disks,  tape media, or any other media? Who will be responsible for verifying backups and restoring data? Summarize the need for encrypting backup data. Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1–2 pages for the project task; 3–5 pages for the executive summary Self-Assessment Checklist for Project Part 4 Task 1 I have recommended open source and commercial software options for the backup. I have designed a plan for full and incremental backups and explained the need for encrypting backup data.  I have designed a process for backup verification and restoring. Self-Assessment Checklist for Project Part 4: Executive Summary of the Project I have demonstrated how to secure a Linux platform using installed commands and other available open source software. I have explained the use of bastion hosts to secure architecture design. I have examined best practices to mitigate security risks to a Linux server using a suitable software management plan.  I have demonstrated the use of a layered security approach on Linux servers. I have described backup, recovery, and incident response in a Linux architecture. IS3440 Linux Security STUDENT COPY: Project

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.