List and describe the different types of hardening.

What will be an ideal response?


Hardening is a process where the vulnerabilities to a system or process are reduced or eliminated. There are three areas to concentrate on: network hardening, operating system hardening, and application hardening. Network hardening involves the use of routers, firewalls, IDS systems, and fault tolerance to help provide a protected and highly-available network. Operating system hardening involves disabling non-essential protocols and services, installing up-to-date service packs, patches, and hotfixes, and properly establishing access control permissions. Application hardening involves updating or patching applications as required, as well as properly administering usernames and passwords (changing default usernames and passwords).

Computer Science & Information Technology

You might also like to view...

To select a random item from an array, you need to generate a(n) ____ for the index i.

A. subscript number B. random number C. element marker D. random marker

Computer Science & Information Technology

The ____ process adds new pixels to a photo to match those already there.

a. editing b. resampling c. pixeling d. formatting

Computer Science & Information Technology

?In _____ type animations, the appearance of text and objects already visible on the slide changes or the text or objects move in place.

A. ?Emphasis B. ?Exit C. ?Motion Paths D. ?Entrance

Computer Science & Information Technology

What do preconditions define in a misuse case?

A. Where the developer are before an attack B. What the attacker must do before attacking the application C. What must the conditions be like for a successful attack D. What program language the code was written in

Computer Science & Information Technology