Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Eation PowerPoint Drawing Tools sons Slide Show Review View MT (Body) - 20 ÅÅ A US AV

Eation PowerPoint Drawing Tools sons Slide Show Review View MT (Body) - 20 ÅÅ A US AV

Accounting

Eation PowerPoint Drawing Tools sons Slide Show Review View MT (Body) - 20 ÅÅ A US AV. Aa. ay.A. Help Format Tell me what you want to do SIA Text Direction Align Text AZ 7.-> Convert to SmartArt- { Paragraph Font OPERATING SYSTEM HARDENIM Maintenance of security is a challenge Required different hardening processes within a data center. O

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

Hardening of the Operatin System(OS) is the act of configuring an OS securely, updating it, creating rules and policies to help govern the system in a secure manner, and removing unnecessary applications and services. This is done to minimize a computer OS's exposure to threats and to mitigate possible risk.

Types of Security Hardening

Since there are several components that combine to make up your system, it stands to reason that there are also different types of security hardening designed to address each. These include the following:

  • Application hardening. This type of protection works to shield an existing application from dynamic and static attacks by inserting new code and manipulating existing contents.
  • Operation system hardening and software hardening. Since operating systems such as Windows and iOS can contain numerous vulnerabilities, OS hardening seeks to minimize the risks by configuring it securely, updating service packs frequently, making rules and policies for ongoing governance and patch management and removing unnecessary applications.
  • Server hardening. This involves enhancing the security of the server by implementing advanced security measures.
  • Database hardening. This involves locking down public access to resources, disabling or eliminating all superfluous functions and giving privileges only to those who need them.
  • Network hardening. This refers to necessary procedures that can help to protect your network from intruders. Cybersecurity steps you can take include using a business-grade firewall, disabling services that you are not using such as file and printer sharing, web server, mail server and many more and installing patches.

Hardening Steps for Data Centre Management

Environment Control

* Temperature and Humidity

The temperature of each computer room within the data centre is recommended to be controlled between 20 and 24 degrees celsius, and a humidity between 40 and 55%.

* Fire Protection

Halon, FM-200 or other total flooding agent solution should be deployed in each computer room within the data centres. Fire extinguishers should be located strategically across the data centres. Wet pipe sprinkler systems must not be used. Emergency power off switches should be available inside each computer room of the data centres.

* Flood Protection

Whenever possible, raised floors should be used in the data centres. Water detectors should be installed beneath the raised floors.

Physical Security

* Location of Data Centre

The locations of data centres should be carefully selected to reduce the risk of accidental or deliberate trespass by the unauthorised parties. The data centres should not have obvious signs. It is best to have concrete walls without windows. If there are windows, universities should use those areas for administrative purposes only.

Data centres are also recommended to be located where the risk of external threats, such as flooding, is low.

* Surveillance

There should be Closed-Circuit Television (CCTV) cameras outside the data centre monitoring the entrance and inside the data centre. Security guards should be hired to monitor the perimeter of data centres and report any incidents to IT management on a timely basis.

* Physical Access Control Device

Lockers or key card access systems should be used to restrict the access to data centres to authorised personnel only. The best practice is to have two-factor authentication systems, such as key card access systems with individual personnel identification number (PIN) for each access card holder. Other systems like biometric (e.g. fingerprint) access control products can also be implemented to achieve this objective.

Disaster Recovery

* Disaster Recovery Plan

Universities should develop disaster recovery plans for their data centres and ensure that the plans are regularly tested, reviewed and updated at least on an annual basis. IT management should ensure sufficient backup resources are available to support the disaster recovery plan.

* Offsite Backup

Regular offsite backups of essential data should be performed by the IT department. The IT management should establish a set of operational procedure to define the scope, frequency, media and restoration of offsite backup process.

Remote Data Centre Management

* Logical Security Requirement

A secure remote data centre management solution should support one or more of the following capabilities:

  • Remote authentication dial-in user service;
  • Lightweight directory access protocol;
  • Breach-prevention modes (programmable response to port scans, pings);
  • Internet protocol (IP) and Firewall packet filtering;
  • Dual-factor authentication;
  • IP security tunnelling etc

Others

* IT Staff Training

Sufficient training program should be provided to IT staff members so that they are adequately equipped with knowledge and skills to perform the monitoring, configuration, installation and maintain tasks for systems and devices hosted within the data centres.

If data centre management software is used, IT management should ensure that comprehensive instruction manual and training courses are offered by vendors prior to deploying the software in production.

Related Questions