Q1 Benchmark – Host Hardening Protecting the host through the process of

Q1 Benchmark – Host Hardening

Protecting the host through the process of hardening is a key skill.

Develop a plan for hardening your VM to minimize systems risks, threats, and vulnerabilities using best practices of secure programming. Make sure to identify specific design principles that could be violated and the appropriate defensive or countermeasures/steps to be taken.

Then, describe the basic secure design fundamentals that will create a trusted computing platform.

Include at least seven host hardening techniques as discussed in Chapter 7 of the textbook, as well as identify the type of control that you are implementing. (here use any

Implement the plan on your VM.

As you go, take instructional notes and screenshots that will help to reproduce your process using the “Report Template,” located in the Class Resources.

Q2. Client Side Attacks

Install a popular anti-malware package on your virtual machine (VM).

Perform a full anti-malware scan of your VM.

Disable the firewall.

Disable your anti-malware software.

Leave the virtual machine connected to the internet for 24 hours or more. You could also visit some sketchy websites such as “Add More RAM” ; or you could visit a malware repository and infect your VM.

Perform a second full anti-malware scan. Document the differences.

As you go, take instructional notes and screenshots that will help to reproduce your process using the “Report Template,” located in the Class Resources.

Sub-Activity: If your scans do not detect any vulnerabilities or malware on the VM, review your chosen anti-malware website for known/current vulnerabilities and document them.

Then, at the end of the report, in roughly 250 words, describe the various types of client-side malicious attacks (including malware), as well as over the network-based attacks.

For both, plagiarism is checked.

Thank you!