© ITT Educational Services, Inc. All Rights Reserved. -Change Date: 01/24/2011 Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style
Length: 1–2 pages
Self-Assessment Checklist
I have recommended the appropriate kernel that can be used by the organization. I have explained the advantages and disadvantages of using each of the kernel options with a valid rationale.
Project Part 3 Task 2: Recommend a software management Plan
Scenario
The original task team at First World Bank Savings and Loan has concerns about the support and software management of the organization’s Linux-based infrastructure. The team wants you to recommend a software m
anagement plan keeping in mind the various
servers and the cost.
Tasks
You need to:
Make a recommendation for a software management plan. Consider options available from the open source community and from vendors. If you select a vendor, specify the software it will support and how it will support. Explain the need to install anti-virus software on Linux servers providing a rationale in support of your answer.
The Business plan on Plan financial management approaches
The assessment task is due on the date specified by your assessor. Any variations to this arrangement must be approved in writing by your assessor. Submit this document with any required evidence attached. See specifications below for details. Performance objective The candidate will demonstrate the ability to plan financial management approaches. Assessment description In response to the scenario ...
Summarize a plan for applying patches and security updates to the Linux system. Submission Requirements
Format: Microsoft Word
IS3440 Linux Security
STUDENT
COPY:
Project
© ITT Educational Services, Inc. All Rights Reserved. -Change Date: 01/24/2011 Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style
Length: 1–2 pages
Self-Assessment Checklist
I have recommended a suitable software management plan. I have explained the need to install anti-virus software on Linux servers. I have explained how to manage critical and noncritical security-related updates. Project Part 3 Task 3: Monitor Logs and Baseline
Scenario
The task team at First World Bank Savings and Loan wants you to research appropriate monitoring tools for the organization’s Linux-based tiered infrastructure. Tasks
You need to:
Summarize the benefits of remote logging.
Recommend tools for:
o
Alerting administrators when files in the operating system have changed. o
Checking for rootkits.
o
Checking for new open ports, files, and system resources. Explain how logwatch can be configured to deliver a daily report from each server summarizing events found in log files. Recommend a schedule and a software application or service to periodically scan the servers to satisfy Payment Card Industry (PCI) Data Security Standard (DSS) compliance requirements.
Submission Requirements
IS3440 Linux Security
STUDENT
COPY:
Project
© ITT Educational Services, Inc. All Rights Reserved. -Change Date: 01/24/2011 Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style
Length: 1–2 pages for the project task; 2–3 pages for the executive summary Self-Assessment Checklist for Project Part 3 Task 3
I have recommended a file integrity checker and explained the purpose of a rootkit checker.
I have explained the use of common GNU’s Not UNIX (GNU) utility tools. I have described the configuration of logwatch and recommended a service or tool for periodic server scans. Self-Assessment Checklist for Project Part 3: Executive Summary I have recommended appropriate kernel options for the organization and explained the pros and cons of each option. I have described the importance of a software management plan. I have explained the use of installing anti-virus software on Linux servers. I have summarized monitoring and logging techniques used in a typical Linux infrastructure.
The Essay on Project Management Plan
Projects in a business are always set up to bring some beneficial change or add value to what the business already have (Knutson and Bitz, 1991). They are therefore set with goals that have to be accomplished. In a business organization, there are staff members given responsibility by the manager or the human resource manager based on their qualification and experience, on the kind of job they are ...
I have described the importance of a suitable backup plan, while maintaining data confidentiality using encryption.
Project Part 4 Task 1: Design a Backup Plan For the various servers that are part of First World Bank Savings and Loan’s Linux-based infrastructure, you have to research and design a backup plan using open source and commercial software. You can create the design based on your discussions with peers in Unit 10 Discussion 1 titled “Creating a Backup Plan.”
Tasks
You need to:
IS3440 Linux Security
STUDENT
COPY:
Project
© ITT Educational Services, Inc. All Rights Reserved. -Change Date: 01/24/2011 Recommend software, both open source and commercial, to use for the backup plan. Explain reasons for your recommendation.
Recommend a design of the backup plan. Answer the following questions: Will you use a dedicated server or
a service provider for backups? Will backups be stored on hard disks, tape media, or any other media?
Who will be responsible for verifying backups and restoring data? Summarize the need for encrypting backup data.
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style
Length: 1–2 pages for the project task; 3–5 pages for the executive summary Self-Assessment Checklist for Project Part 4 Task 1
I have recommended open source and commercial software options for the backup. I have designed a plan for full and incremental backups and explained the need for encrypting backup data. I have designed a process for backup verification and restoring. Self-Assessment Checklist for Project Part 4: Executive Summary of the Project I have demonstrated how to secure a Linux platform using installed commands and other available open source software.
I have explained the use of bastion hosts to secure architecture design. I have examined best practices to mitigate security risks to a Linux server using a suitable software management plan. I have demonstrated the use of a layered security approach on Linux servers. I have described backup, recovery, and incident response in a Linux architecture. IS3440 Linux Security
The Term Paper on Analysis and Design of Software Architecture
Outline 1 2 3 4 5 6 7 8 Development Process Requirements Quality Attributes Runtime QA Non-runtime QA Requirements Analysis: Example Architectural Analysis & Design Architectural Views Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 2 / 78 Development Process Methodology Different software development processes have software architecture as a part of the process Rational unified ...
STUDENT
COPY:
Project