Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Part 1: Hardening Windows Written Portion Requirements In 500 words or more, answer the following: What are some things you can use to protect network traffic from being sniffed if you are...

1 answer below »


Using the materials in GitLab, Firebase and the
vulnerability report. Please add security features where necessary and write in
a report of what changes were made.



Please use my login for writing the report (It is the same
as the Firebase login).



For the report add to the following link:



https://docs.google.com/document/d/1D2hGLLK2yR6DlvUSJ6OqeEUdG3hU7FOdb6ySKIcGWQc/edit?pli=1&tab=t.0#heading=h.8h0npxsghoww





To connect to the Firebase and GitLab you will need to
connect to the VPN first. Please be very thorough, it needs like I need to have
worked on this for weeks.





Use the following link to access Gitlab. You will have to
first be connected to the VPN



https://gitlab.cs.wwu.edu/users/sign_in



GitLab Login (Alumni Money)



XXXXXXXXXX



&pHjT&D8T*VdBi





Use the following link to connect to the firebase



https://accounts.google.com/InteractiveLogin/signinchooser?continue=https%3A%2F%2Ffirebase.google.com%2F_d%2Freturn%3Fcontinue%3Dhttps%253A%252F%252Ffirebase.google.com%252F&ifkv=AaSxoQyKgRPXvyvulAjae94-DKUd9-NjI8SYYLjXbQdU8rI4JnzumFHTlORJlT9htpNicpny__hE7w&ddm=0&flowName=GlifWebSignIn&flowEntry=ServiceLogin



Firebase Login



XXXXXXXXXX



C!nn@m0n!1998





Use the following link to download the vpn client



https://support.cs.wwu.edu/home/access/csci_vpn/index.html



OpenVPN Connect Login



XXXXXXXXXX



&pHjT&D8T*VdBi

Answered Same Day Nov 24, 2024

Solution

Shubham answered on Nov 25 2024
3 Votes
Part 1: Hardening Windows
In dealing with unsecure protocols that transmit data on network becomes vulnerable to interception because of malicious actors. This uses secure protocols like HTTPS and SSH that is considered as ideal. This includes ways to mitigate risks that is forced to rely on less secure options. The effective approach is use of Virtual Private Network that encrypt traffic between client and VPN server. This requires encapsulating data in the encrypted tunnel. VPNs will ensure that in case of interception of the traffic, it cannot decipher the content. This provides layer of security for protocols that may lack encryption. The next option is wrapping insecure protocol on Transport Layer Security tunnel. Tools like stunnel allows to secure vulnerable communications by encrypting the data during transmission. It is useful for legacy applications and systems that can help in upgrading to modern protocols. At the network level, the implementation of IPsec is considered as best solution. IPsec works at IP layer that will ensure encryption and authentication of traffic between endpoints that is used to be configured. In the application-specific encryption methods, IPsec is protocol-agnostic and protects data that is exchanged across the network (Khan & Alghathbar, 2020). It will help in ensuring that sensitive information remains secure for the untrusted networks. In the environments that has unsecure protocols that is required to be used requires reducing the risk of interception through network segmentation. This can be done by isolating devices that use insecure protocols in separate VLANs and networks. In provides chances to attackers for gaining access to sensitive traffic that can be minimized. This requires strong network access controls like requiring authentication and restricting connections for authorized devices that will add layer of protection. It includes measures to enhance security and it is important to prioritize transition that is away from insecure protocols. Modern tools and systems support secure alternatives can help in reducing risks and this do not require extensive mitigation strategies.
The update of Linux operating system is different from updating Windows in terms of processes and use of tools. Linux updates are managed through package managers like apt and yum/dnf. These are tools that provide centralized control over updates that will enable users to update operating system and install software packages. It is the process that relies on repositories that are are curated by distribution maintainers for ensuring compatibility and stability. Windows updates are managed through the Windows Update service. It is the system that focuses on the operating system that includes support for updating Microsoft applications like Office. Windows includes updates that are modular and allow greater user control. Windows updates are often bundled and this requires the installation of cumulative updates that include previous patches. Windows updates are automated with less options for granular control (Ramana & Gupta, 2021). The enterprise environment of Windows can use tools like Windows Server Update Services for centralized management. Linux systems can install updates that require rebooting for server environments. In case of kernel updates, tools like kexec and live patching solutions allow updates to be applied and this do not get affected by downtime. Windows updates requires reboot to complete installation that can affect...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Looking For Homework Help? Get Help From Best Experts!

Copy and Paste Your Assignment Here