CYB 300 Final Project David Obi

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

300

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

12

Uploaded by JusticeRain3195

Report
12/12/2023 Obi, David [COMPANY NAME] CYB 300 Final Project Haifeng Ji
Part I In Milestone One, you developed a script to create a baseline for newly acquired computer assets. In this project, some of these assets are being relocated to a remote location with additional requirements. Develop a script to implement this new baseline configuration to meet the following requirements: a. Rename computer to First Initial_Last Name (use your first initial and your last name) b. Change time zone to the time zone associated with Denver, Colorado
c. Get a list of running services d. Stop the Print Spooler service e. Set idle lock time for screensaver to 3 minutes
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
f. Send the output of first 50 entries in security event log to a text file named “SecurityLog_LastName.txt”
Part II For this part, you will be completing the creation of a CA in a dedicated lab environment. As a result of relocation, in addition to the scripts associated with the baseline hardening, you need to create a new certificate for this remote location that meets the following set of security requirements: a. Hash value = SHA256 b. Key length = 1024 c. Name = Colorado Office d. Validity period = One Year e. Force the certificate to run without asking for confirmation
Part III For this part, you will discuss the importance of industry guidelines, organizational baselines, and checklists as they pertain to system and communication security. Prompt You must address the  critical elements  listed below. Most of the critical elements align with the competencies (shown in brackets). I. Automated Hardening Scripts:  Compose a single executable script to automate hardening tasks to meet the requirements in the scenario. a. Screenshot of a single  executable script  in the PowerShell ISE environment b. Screenshots that  evidence  each requirement has been met
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
In this screenshot you can see that the computer name (System Name) has been changed by using a line of commands in the ISE Powershell scripting. c. One of the main reasons that practitioners use automated scripts is to save time by avoiding manual configurations. Describe  additional benefits  of using automated scripts for configuring systems in a secure manner for organizations. Automated scripts can and WILL save an immense amount of time for cyber security team members that are performing their daily tasks and protocols. Since
there is time being saved during their work periods, the cyber security team can now assert there attention to the other problems they may need to fix within the organization’s security infrastructure. Any manual process that have been made automated can now be ran almost exclusively by the system now which will more than likely reduce or even eliminate any errors from happening during the process of automated scripting. II. Certificate Authority: a. Provide a screenshot of  final CA  with settings that meet the organizational requirements b. Provide a screenshot of  CA applied  to the workstation you renamed in Part I as an issued certificate with expiration date
c. Discuss how  implementing PKI  addresses two of the Fundamental Security Design Principles and how this maintains the tenets of the confidentiality, integrity, and availability (CIA) triad in an organization Least privilege will more than likely be used during the creation of a custom certificate to suit an organization’s needs. When a certificate utilizes least privilege there will be limits/constraints on who can access certain information and data. This act will fall under confidentiality since data and information is being stored and protected from others to see and gain access to. Fail secure can also be used by implementing PKI. Certain objects will be locked and hidden from users that are not given access to view or change the nature of the object and this once again falls under confidentiality. III. Hardening Systems:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
a. Discuss how to make the  transition  from industry guidelines to a baseline that is appropriate for your organization Transition from industry guidelines to a baseline that better suites the company would be a huge plus for any company. The personnel and security that would oversee this transition could look towards making a safer and more improved company system and network infrastructure. I would highly recommend implementing a secured Wi-Fi network to prevent network attacks from potential hackers. Using WPA2 would help with network security by securing the network connection and data transmission between devices connected to the organization’s Wi-Fi. b. Create an  operating system security-configuration checklist  representing the elements used in Part I: Automated Hardening Scripts OBJECTIVES PRIORITY COMPLETION Change computer name LOW Complete Change time zone to “Mountain Standard Time” LOW Complete Get list of running services MEDIUM Complete Stop printer Spooler HIGH Complete Activate screensaver HIGH Complete Set a screen lock time HIGH Complete
Get information from event logs MEDIUM Complete Create and implement “Colorada Office” certificate HIGH Complete c. Explain why operating system security-configuration checklists are an important part of the  cybersecurity practices  in an organization Using a checklist would help with tracking any assignments or objectives made by the cyber security team. Work days could be very hectic for the security team as well so managing their progress could be very difficult to do but this could be a more manageable feat if the team is using a checklist. REFERENCES: Limited, I. (n.d.). What are automation scripts? | Infosys BPM. Www.infosysbpm.com. https://www.infosysbpm.com/blogs/robotic-process-automation/brief-study-of-automation-
scripts.html#:~:text=The%20benefits%20of%20automation%20scripts&text=Server%2Dside %20execution%3A%20Cloud%2D published, N. D. (2023, June 21). Five ways hackers can steal your data on public Wi-Fi. TechRadar. https://www.techradar.com/vpn/ways-hackers-can-steal-your-data-on-public-wi-fi Ghimiray, D. (2022, May 10). What Is WPA2 (Wireless Protected Access 2)? What Is WPA2 (Wireless Protected Access 2)? https://www.avg.com/en/signal/what-is-wpa2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help