Professional Documents
Culture Documents
Hùng:
- Update softwares and operating systems regularly.
- Encrypt and backup important data.
- Penetration testing for vulnerabilities.
- Applied 2FA to all system log-in.
Phước:
- Backup data
+ Encrypted backed up data that contains sensitive information
+ Protect it with a password if possible
- Install trusted software
+ Install software or any package from credible and trusted sources to prevent
security risks to the infrastructure
- Encrypted data when needed
+ Translate sensitive electronic data into an intelligible code
+ Only authorized access can access and decipher the code
- Have a robust firewall system
+ Extra protection for built-in security features of the system
+ Prevent outsider threats
Long:
- Utilization of SSH Key Authentication
+ Using password still have a chance of being bruteforced or dictionary
attacked
+ Better security for IAM
- Use Strong Data Encryption
+ Better data security
+ Prevent the risk of data leakage
+ Provide better data integrity
- Regularly check for vulnerabilities:
+ Ensure the safety of IT infrastructure
+ Have a better insight of the infrastructure
- Update regularly
+ Up to date security resolution might available
+ Fixed some mistake made by developer
+ Have a healthy infrastructure without any vulnerability to well known
exploit
Assignment 6
Course Name: IAP302
Instructor Name: Hồ Hải
Lab Due Date: 22/6/2021
I.T. Department staff will not login I.T Linux, UNIX Using Prevent
as root on to UNIX, Linux systems, Departmen System System unauthorized user
but will use the su command to t access vulnerability
obtain root privileges of Linux system