Professional Documents
Culture Documents
SECURITY HARDENING
Name
Institution
Course
Professor
Date
SECURITY HARDENING 2
practices that may be used to harden the Windows security and protect against
recommendations include robust password policies and user account controls that
ensure top-notch security (Monrose et al., 2012). Further details are provided in the
sections below.
Regarding password use, the system should be configured only to allow strong
passwords from user accounts. A secure password must be at least eight characters
long and consist of various types of characters (Monrose et al., 2012). Strong
passwords make it hard for cybercriminals to guess or crack using such approaches as
dictionary attacks. As part of the procedural security controls, a clean desk policy should
be enforced at the organization to ensure that the employees do not put pieces of paper
containing critical information around their workstations. The policy should also require
Another control target users who have multiple user accounts. To ensure
maximum security, these users must have different passwords for the different user
that, if a hacker managed to steal credentials for a single user account, then the other
accounts would not be compromised. As well, the users who have multiple accounts
should only use their accounts for the roles that the accounts are primarily dedicated
for. That measure would allow system administrators to recognize any unusual activities
SECURITY HARDENING 3
in the user account characterized by the use of an account to perform roles for which it
is not authorized.
demilitarized zone (DMZ). In internet security, DMZs are used to act as extra security
layers to protect an organization's network systems from external access. The local
area network used by the organization is protected by a firewall that closely monitors
and filters network traffic that goes in and out of the network systems. Once correctly
installed, the DMZ can help identify and mitigate security threats before they reach
When authenticating access into the servers, the systems must ensure that the
source computer has been established. The source of the computer constitutes the
location of the computer and the type of user. It is critical to identify computers that try to
connect to the organization's servers from a remote location as well as those that
Employees from the company who work from their homes must use a VPN to
ensure that security of Always Fresh's systems are protected in case cybercriminals
compromise security. Any user who attempts to access the servers anonymously
should be shut out. Often, cybercriminals try to access the company's systems by hiding
their details as well as a means of covering their tracks. Any unusual login activity,
regardless of the source computer, should be flagged immediately. Such action includes
multiple wrong password inputs and any other attempts to circumvent the typical
security setup (Durve & Bouridane, 2017). The system should block an account that has
contact the system administrator to retrieve the report. A customer whose account is
blocked as well requires to contact Always Fresh's customer service team to recover
References
Durve, R., & Bouridane, A. (2017, September). Windows 10 security hardening using
Monrose, F., Reiter, M. K., & Wetzel, S. (2012). Password hardening based on