Free Essay

Securing Internet Client and Server Applications on Windows Systems

In: Computers and Technology

Submitted By Shaneebee
Words 398
Pages 2
Securing Internet Client and Server Applications on Windows Systems

Assessment Worksheet

Note: This tab is for reference only. Please see your instructor to determine the assessment they wish you to use.

Both IIS and Internet Explorer can be hardened to improve confidentiality, integrity, and availability (CIA). In this lab, you identified security hardening opportunities for the IIS application, then made those changes on a Windows Server 2012 machine. Next, you will identified and modified the Internet Options for the Internet Explorer browser. Finally, you documented the changes you made and provided an explanation for how each change helps achieve CIA.
Lab Assessment Questions & Answers

1. What are the steps you took to harden IIS?
Disabled services not used by functional roles and blocked ports that were not in use. These steps are necessary because servers proved one or more specific services on the network.
2. What are the steps you took to harden the Internet Explorer browser?
Opened only minimum required ports at the firewall; use encrypted connections for all communications; disabled any unneeded server features on the Web server. These are important because they heighten security.
3. As a result of this lab, which changes will you implement on your own Internet browser? Why?
Disable any features that are not being used. Also turn on pop-up blocker.
4. Why should you change the directory where the log is stored?
You should change the directory where the login is stored because it makes it more difficult for attackers to obtain the login information and gain access to the network.
5. Should the security updates for IIS, and the server it is hosted on, be installed as soon as they are available?
The updates should be evaluated first and then applied if needed.
6. List some best practices for hardening IIS.
Ensure antivirus/anti-malware software is installed and up-to-date; review all running services and programs and disable ones that are not needed; ensure Windows firewall settings only allow network traffic for the services and applications really needed; and create separate password-protected user accounts.
7. List some best practices for hardening Internet Explorer.
Do not click on popup boxes unless it is the little red X up in the corner to close them. Have Explorer Prompt user to run activeX. Disable any addons that will not be used. Continuously clear out unneeded extensions.…...

Similar Documents

Free Essay

Linux and Windows Server Critique

...Linux versus Windows The purpose of this document is to explore the benefits or disadvantages of using UNIX® or Linux® versus Windows Server® for company business operations at Kudler Fine Foods. Background Three grocery stores in southern California comprise Kudler Fine Foods. Employing approximately 150 people, Kudler caters to people who enjoy gourmet-class foods, first-rate service, and a friendly atmosphere helps make a pleasant shopping experience. Current company information technology (IT) assets include local 10BaseT Ethernet networks at the three locations, Windows Server at the La Jolla headquarters, and 56kb modem links between the facilities enabling sharing of company information. At each store a point of service (POS) cash register application links the 20 total terminals to a proprietary purchasing application for inventory price lookup and monetary exchanges. The company also uses the Windows Server platform to run an e-commerce website for sales of select inventory over the Internet. Security The Kudler Fine Foods e-commerce stores security of the server is the number one priority of team B. Which server is the most secure, Linux or Windows? Many information technicians have their favorite but the bottom line is, which operating system has the target on their back as far a security breaches. According to Noyes (2010) there are five key factors that make Linux superior to Windows. • Privileges • Social Engineering • The Monoculture Effect •...

Words: 2469 - Pages: 10

Premium Essay

Client Server

...CLIENT SERVER PROGRAMMING AND MULTIMEDIA Introduction Client/server describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request. Although the client/server idea can be used by programs within a single computer, it is a more important idea in a network. In a network, the client/server model provides a convenient way to interconnect programs that are distributed efficiently across different locations. Computer transactions using the client/server model are very common. For example, to check your bank account from your computer, a client program in your computer forwards your request to a server program at the bank. That program may in turn forward the request to its own client program that sends a request to a database server at another bank computer to retrieve your account balance. The balance is returned back to the bank data client, which in turn serves it back to the client in your personal computer, which displays the information for you. The client/server model has become one of the central ideas of network computing. Most business applications being written today use the client/server model. So does the Internet's main program, TCP/IP. In marketing, the term has been used to distinguish distributed computing by smaller dispersed computers from the "monolithic" centralized computing of mainframe computers. But this distinction has largely......

Words: 2053 - Pages: 9

Premium Essay

Introduction to Operating Systems and Client/Server Environments

...Introduction to Operating Systems and Client/Server Environments Course: IT140-1304A-03 Professor Mohammed Majid Phase 5 Group Project November 11th, 2013 Group E Contributors: JoAnna Prueter Benjamin Ricks Starting a company from the ground up there are many considerations to take into account, especially when it comes to computers, operating systems, networking, security, and everything else to do with the Information Technology side of the house. Being that the company envisioned is, at this point, just a blueprint in our minds we will have to start from the absolute beginning with cost, performance, low downtime, training, and efficiency in mind. Step by step we will come closer to our end goal of a relevant architecture for a turnkey establishment that will continue into the next generation of technological advancements. With cost in mind either an open source operating system or volume licensing are the best options available. Also focusing on limited required training to show staff how to utilize the system places Windows 7 as the best option with the most functionality and least concessions. Windows 7 shows many improvements over its predecessors but does not share the learning curve that Windows 8 does. Windows 7 should be continually supported by Microsoft for years to come, unlike Windows XP, again making it a viable option to become a standard within the company without requiring costly operating systems upgrades for some time. For the best......

Words: 2267 - Pages: 10

Free Essay

Client and Server Security

...Table of Contents Project Outline 3 Security Requirements 4 Perimeter Security 5 Client and Server Security 10 Database Security 10 Server Security 12 Wireless and Remote Access Security 15 Security Configuration Management 19 References 23   Project Outline Tiger Tees is a medium sized business with 4 locations across the eastern United States. This company produces and sells t-shirts for school systems, both locally and across the country via the internet. The organization’s headquarters is located in Beckley, West Virginia, and employs 25 people. The departments include the warehouse, human resources, accounting, sales, and administration. The second location of Tiger Tees is located in Columbus, Georgia, and employs 10 people full time, and 4 persons part time. The third location is located in Washington, DC, and employs 15 people. The fourth location located in Richmond, Virginia is the smallest of all the locations employing 5 persons full time. Tiger Tees is a fast growing company in dire need of a secure network that will ensure that the confidentiality, integrity, and availability of client information remain confidential. All transactions completed are sent to the organizational headquarters in Beckley, WV and processed there. In the past these orders and transactions have been completed by telephone and e-mail. A secure wide area network would streamline this process making the transactions more secure, and providing faster service to the......

Words: 5336 - Pages: 22

Premium Essay

It140-1304b-04: Introduction to Operating Systems and Client/Server Environments

...Colorado Technical University IT140-1304B-04: Introduction to Operating Systems and Client/Server Environments Table of Contents Introduction to Operating System 3 Project Organization 3 Windows 3 Linux 5 Virtualization 6 Components of a Computer System 8 Managing Client – Server Environments 9 Securing Operating Systems 10 System Administrators 11 Configuring Windows 7 and Linux+ Prep LabSim Toolkit 12 Phase 1 LabSim 12 References 13 * Introduction to Operating System Project Organization ACME is a pharmacy based healthcare provider that has 25 physical locations across the state of Michigan. The company provides long term patient care to the community mental health organizations across the State of Michigan. The organization is an industry leader in a clinical pharmacy services and has grown tremendously over the past 10 years. The organization is privately held and the senior leadership team as well as the centrally managed and support IT infrastructure is located at a single headquarter facility. ACME’s network is comprised primarily of Windows Server 2008 R2 servers, Windows 7 and Windows XP workstations, Microsoft Exchange Server 2010 for messaging, Microsoft SharePoint server for intranet support and Microsoft SQL server as the database platform. The company also utilizes QS1 Data Systems as its primary patient care system and DocuTrack as the document management system. The ACME network is a spoke and hub topology with the......

Words: 1536 - Pages: 7

Premium Essay

Client Server VHD files System Image Backup 3) conserves WAN bandwidth Branch Cache 4) are files cached on each client Distributed Cache Mode 5) are previous versions of files. Volume Shadow Copies 6) are files changed since the last backup job Incremental Backup 7) is accessible from a Windows 7 instllation disk Windows RE 8) files cached on a central server Hosted Cache Mode 9) executes Power Shell commands on remote computers Windows Remote Management 10)includes configuration settings and registry information System Restore Point 1) What service priority guideline is NOT accurate? Rate issues according to how the issues affect senior management. 2) Place these troubleshooting steps in the correct order, using the procedure described in this lesson as your guide. Establish Symptoms, Most probable cause, Test results, Document Solution 3) Which Windows 7 tool does NOT aid in the network troubleshooting process? User account Control Panel 4) Which Windows 7 tool does NOT aid in the hardware troubleshooting process? Nslookup.exe 5) What operating systems cannot use Branch Cache? (choose all that apply) Windows Vista and Win Serv 2008 6) When you load Win RE from the Windows 7 installation DVD, the system provides you with a choice of recovery tools; what tool is NOT included? Win Easy Transfer 7) Place the following steps of the Windows 7 startup process in their proper order. Post, Initial Startup, Boot Manager, Boot Loader 8) Which Windows XP startup......

Words: 324 - Pages: 2

Premium Essay

Securing a Linux System

...Unit 1 Discussion 1: Securing a Linux System Learning Objectives and Outcomes * You will present different views on security related to a Linux system. * You will be able to identify risks related to the implementation of a Web application in a Linux environment. Assignment Requirements A small community bank is studying the prospect of maintaining its own in-house Linux Web server for a Web application. The Web application will allow the bank’s customers to login, view their loan details, and check and save account balances. The company sends you a request for your services as a Linux and open source consultant. You grab the opportunity because you are dissatisfied with your current job. It is your first day in the community bank, and you are told that your role as a consultant will be to analyze all probable risks related to the prospective Web application. Your manager introduces you to the other employees, including Bob, who is an intern working on the development of the Web application. Bob is also the system administrator as he currently supports the local area network (LAN) environment. You discuss the Web application and its functioning in detail with Bob. Bob tells you that the server will be hosted at the bank’s location since the other servers are presently supporting their Microsoft Windows-based LAN. The Web application will run on any of the popular open source servers. Knowing your background, Bob is very excited to learn Linux and use this......

Words: 967 - Pages: 4

Free Essay

Best Practices in Managing Chances to Windows Systems and Applications

...IS3340-WINDOWS SECURITY | BEST PRACTICES IN MANAGING CHANCES TO WINDOWS SYSTEMS AND APPLICATIONS | UNIT 10 DISCUSSION 1 | | | 5/29/2014 | | Just as Ken 7 Windows Limited is experiencing Denial of Service attacks, many corporate websites have suffered from illegal DoS attacks more than once. Companies that learn how to turn these experiences to their advantage go a long way to ensuring it doesn't happen again. The summary of what is being seen on the infrastructure is thus; * Denial of Service (DoS) attacks on the Web Servers supporting Ken 7 Windows clients. * Remote clients report connection failures/difficulty accessing Ken 7 Windows planning and order management software application The events of a network attack can uncover some very important mistakes and provide more than a few lessons. Turning these lessons into best practices is where the rewards of such adversity are realized. Ken 7 Windows can arrive at these best practices by asking: "How are we vulnerable?" The following best practices are a sample of some of the common conclusions following a DoS attack. 1. Create a virtual private network (VPN) for authenticated user. 2. Separate authentication an anonymous users on separate servers (some on different subnets). 3. Use firewall rule to close all ports except 80 (HTTP-Hypertext Transfer Protocol) & 443 (HHTPS-Hypertext Transfer Protocol over TLS/SSL). 4. Restrict all anonymous user accounts. 5. Use......

Words: 435 - Pages: 2

Premium Essay

Installing Windows Server Networking

...Installing Windows Server Networking Eric A. Jordan Sr. POS421 19 May, 2014 William McKee Before I explain the server roles available to install Windows Server® 2008 R2, I would like to give a brief description of Windows Server 2008 R2. Windows Server 2008 R2 is an operating system, which has a business functionality more than a consumer atmosphere. Window Server 2008 R2 has such things as self-healing NFTS, which for the most part you will not see this function running on your computer. There is also server message block, hyper v, and core packing just to name a few features and functions. There are four different main editions of Windows Server 2008 R2, which are the Standard Edition, Enterprise Edition, Datacenter Edition, and Web Edition. Choosing the correct windows edition will require the administrator or organization to understand the workload needs and requirements to ensure they choose the right operating system. Below is a list of several server roles available in installing Windows Server 2008 R2. Active Directory Certificate Services (AD CS) provides customizable services for creating and managing public key certificates used in software security systems employing public key technologies (Microsoft, 2014). Active Directory Domain Services (AD DS) provide secure, structured, hierarchical data storage for objects in a network such as users, computers, printers, and services (Microsoft, 2014). Active Directory Federation Services (AD FS) provides Web......

Words: 720 - Pages: 3

Premium Essay

Client Server 2

...Cheyenne Avenue, Suite 600 North Las Vegas, Nevada 89032 NT1330 Client-Server networking II Name: ____________________________________________________ Date: _______________________ NT1330 Week 1 Unit 1 Assignment 1 Instructions: 1. Complete this assignment and submit it prior to the beginning of the next class meeting. 2. Completely fill in the bubble for the correct answer(s), any other mark such as an X or just a line through it will be marked as incorrect. True/False Indicate whether the statement is true or false. 1. IPv6 uses 128 bits, or 16 bytes, for addressing, thus providing 2128 (about 340 billion) unique addresses. A True B False 2. Dynamic IP addresses can be assigned when administering TCP/IP hosts. These addresses must be configured and maintained manually. A B True False 3. Using DHCP relay agents eliminates the need to have a DHCP server on every subnet. A True B False 4. One benefit of the hierarchical structure of DNS is that it is possible to have two hosts with the same host names that are in different locations in the hierarchy. A B True False 5. ICS turns your computer into a router so that other computers on the local network can access its Internet connection. A B True False 6. If you inappropriately allowed network discovery in a public network environment (for example, an Internet café), you would allow total strangers to see and access any file shares on your system. A B True False Steve Todd Page 1......

Words: 1872 - Pages: 8

Free Essay


...NETWORK MODELS CLIENT/SERVER & P2P 11/24/2014 Condarrial McCall | Condarrial McCall November 23, 2014 NT1110 CLIENT/SERVER -The roles of each computer in a client/server network are distinctive, affecting both the hardware used in every computer and the software installed in every computer. In a client/server environment there are many advantages such as, increased security, central administration, and making sharing better. Some examples of client/server networks; Windows Server 2003, Novell Netware servers, and Windows 2000 server. Some benefits of a client/server network are only a single computer, or group of computers can be the central of all the networking services that may be needed. The security is quite easy with this type of network model, since it can setup a single server to handle all information requests or login requests for the whole network. Meaning there can be one username and password for each individual user on the network. SERVER Is a computer on the network that provides other computers called (clients or workstations) with access to resources, such as disk drives, folders, printers, modems, scanners and internet access. Server run tasks for clients, file servers holds data and programs files for clients, mail servers holds and distribute email to clients. Servers can be used for different types of software and tasks. Servers tend......

Words: 704 - Pages: 3

Premium Essay

Windows Servers

...Topics |Securing Windows 7 |Installing Windows Server 2008 | |Password and Account Lockout Policies |What Defines a Server | |Windows Firewall Configuration |Server Hardware | |Encrypting File System (EFS) |Windows Server 2008 Editions | |Remote Access Technologies |Server Roles in Windows Server 2008 | |Backup and Restore |Method of Installing Windows Server 2008 | |System Restore Points |Server Configuration | | |IP Address Settings | | |Management of Devices and Device Drivers | | |Microsoft Management Console (MMC) ...

Words: 2079 - Pages: 9

Premium Essay

Securing a Linux Server

...Erik Thompson IS3440 21 Sep 2015 Unit 1 Discussion 1 Securing a Linux System As the significant prevalence of Linux web servers globally grows, security is often touted as strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place. Many risks are possible from a compromise including using the web server into a source of malware, creating a spam-sending relay, a web or TCP proxy, or other malicious activity. The operating system and packages can be fully patched with security updates and the server can still be compromised based purely on a poor security configuration. Security of web applications first begins with configuring the server itself with strict security in mind. Many will often deploy various layers of security to react in real time to various hacking and threats for HTTP requests. Securing the entire server and any running services with a high level of security in mind is the first fundamental step to avoid the risk of being hacked or compromised. With the abundance of malware being installed into web applications hosted on Linux based servers, it is clear many servers are configured with little or no security in mind. For small and large businesses, having a......

Words: 555 - Pages: 3

Premium Essay

Windows Server

...Windows Server Deployment Proposal Overview Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and may include additional diagrams, charts or tables. The assignment is meant for students to enhance their mastery of the material and to provide a creative and realistic way in which to apply knowledge from this course.  Scenario Worldwide Advertising, Inc. (referred to as “WAI”) has hired you as an IT consultant for implementing their Windows network infrastructure. WAI is a new advertising firm, and they are currently hiring staff, establishing two locations, and have a need to get their internal IT services configured. They do not yet have an IT staff, but when they do, the IT staff will take over all aspects of IT administration. You are required to supply WAI with a solution which describes the implementation and configuration of their core IT services. Cost is not a significant concern – WAI wishes to implement the “right” solution to fit their needs now and for the next 2-3 years. There are several details about WAI which will have an impact on your choices: * WAI will start with 110 employees, in the following departments: * Executives (9 employees) – manage and run the company * Accounts and Sales Department (15 employees) – perform market research and maintain accounts * Creative, Media and Production......

Words: 1074 - Pages: 5

Premium Essay

Windows Server

...CMIT 369 7981 Installing and Configuring Windows Server Windows Server Proposal Worldwide Advertising Inc. Summary Wordwide Advertising Inc. is a newly established advertising firm will require a server environment to manage a starting staff of 90 employees and various roles required to manage their network. Windows Server 2012 will be installed to manage the following server roles. Exchange to manage company email, Active Directory to manage the domain to include users, computers, groups, sub domains, DHCP and DNS, file and print sharing, cloud storage, as well as backup solutions. There will be two locations which will require inter-site connectivity through a secure tunnel. The site in Los Angeles will house the majority of the employees while the New York location will have a smaller staff consisting of at least one employee from each department. New Features in Windows Server 2012 There are new features in Windows Server 2012 that Worldwide Advertising will be able to take advantage of. Some of these new features are as follows: You can leverage new features in Active Directory to enable employees and partners to access protected corporate data from their personal devices and at the same time manage risk and govern the use of corporate resources. Active Directory Domain Services (AD DS) in Windows Server 2012 includes new features that make it simpler and faster to deploy domain controllers (both on-premises and in the cloud),......

Words: 1086 - Pages: 5