Objeactive:
The objective of this assignment is to explore Information Security and Assurance(IS&A)concepts, identification attacks, and setting account policies. Through this assignment, you are required to do secondary research in addressing some of the challenge s you will encounter. The final submission must be in a report format (as per the sample p site d on blackboard).Deliverables: A single report document answering all listed questions or with results of activities. The final document must meet the submission requirements at the end of this document.
Part A:
.Based on the course content, class discussion, and other research materials, discuss the followingInformation Security Risk Concept or statement:a.The re Is No Such Thing As Abs olute Se curity. At a minimum, 1 paragraph –Maximum 1-pagedocument [5Marks]
b.Se curity Through Obs curity Is Not an Ans we r. Why is security through obscurity a lousyidea for the overall security of a system? At a minimum, 1 paragraph –Maximum 1-pagedocument [5Marks]c.Comple xity is the Ene my of Se curity. At a minimum, 1 paragraph –Maximum 1-pagedocument [5 Marks]d.Ope n Dis clos ure of Vulne rabilitie s Is Good for Se curity. At a minimum, 1 paragraph –Maximum 1-pagedocument [5 Marks]2.Visit www.opendns.com/phishing-quiz/ and take the “ThinkYou Can Outsmart Internet Scammer?” quiz. Provide a screenshot of your results and details of the site you failed to spot (refer to figure 1 and 2). In oneparagraph, discuss standardfeatures, whichhelp identify possible electronic fraud. At a minimum, 2 paragraphs –Maximum 1-pagedocument [15Marks
Part B
For the first part of this assignment,you will select an operating system you currently have access to (a VM is fine,e.g. “Windows 2008 Svr01”). You will document via screenshots and written instructions, the processes you use to harden the OS. You must perform tenspecific hardening tasks thatmay be drawn from the lecture notes and class discussions or your repository of IT security tips and tricks. You will compile the screenshots (or other images) and step-by-step instructions into a single document that should read like a security configuration manual for the OS. [ 30 marks].
@font-face {font-family:Mangal; panose-1:2 4 5 3 5 2 3 3 2 2; mso-font-charset:1; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:40963 0 0 0 1 0;}@font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:0; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:-536870145 1107305727 0 0 415 0;}@font-face {font-family:Calibri; panose-1:2 15 5 2 2 2 4 3 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-536859905 -1073732485 9 0 511 0;}p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin:0in; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Calibri",sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:Calibri; mso-fareast-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:Mangal; mso-bidi-theme-font:minor-bidi; mso-bidi-language:AR-SA;}.MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; mso-bidi-font-size:12.0pt; font-family:"Calibri",sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:Calibri; mso-fareast-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:Mangal; mso-bidi-theme-font:minor-bidi; mso-bidi-language:AR-SA;}div.WordSection1 {page:WordSection1;}