logo

Security Hardening Requirements and Contents of Operating System and Application Security Contents

   

Added on  2021-01-02

12 Pages3214 Words467 Views
 | 
 | 
 | 
Operating system and ApplicationSecurity
Security Hardening Requirements and Contents of Operating System and Application Security Contents_1

ContentsINTRODUCTION...........................................................................................................................1SECTION 1......................................................................................................................................1Security hardening Requirements...............................................................................................1Controls and measures of security hardening requirements.......................................................5CONCLUSION ...............................................................................................................................7REFERENCES ...............................................................................................................................8
Security Hardening Requirements and Contents of Operating System and Application Security Contents_2

INTRODUCTIONOperating system (OS) can be considered as the comprehensive process which controlsintegrated components such as hardware, software, security, confidentiality and availability.Application security canj be reffered as those measures which companies adopt to protect thedata and information. Application hardening of OS determines configuration of security featuresand it also consists of rules and policies which helps in governing the system in more securedmanner. This also helps in excluding unnecessary services and application. This study willcontain information on security hardening requirements. The report will also focuss oncybersecurity frameworks which protect the confidential data of the company. Furthermoer, itwill explain about the security requirements of IMAP or EAS. This report will also provide briefview about security measures which control these security operating system and Applicationsecurity.SECTION 1Security hardening RequirementsSecurity hardening requirements is basically a process of securing operating system byreducing the complexities of functions. this can be resolved by adopting single function systemwhich is more secured than multi-purpose system. These hardening requirements helps ineliminating lot of risks. In present time, there are number of issues and problems which areoccurring in systems (Shaghaghi and et.al., 2018. ). This has resulted in data loss and leakage.Hence, it leads to change in connection of network. There are many security hardening toolsavailable which can be installed.In addition to this, installation of additional software and systems is used to providesecurity to systems and it also helps in reducing vulnerabilities in different functions of thedevice. They help in encryption of data packets and delivering them to destination. Also, itproviding more security to systems ensure that vulnerabilities are removed. Furthermore, thereare many other things due to which security is provided to systems. This report will showdifferent types of security hardening tools which will be installed in system. Also, it will describepolicies while implementation of devices and tools.Applications: Application provides lot of services including Mail transfer services and mailboxserver (Roesner, Kohno and Molnar, 2014). Email can be considered as a main source ofcommunication in this technology based world. Therefore, Email services are great point of1
Security Hardening Requirements and Contents of Operating System and Application Security Contents_3

concern for many business operators. So lot of security requirements are arrived in transferringmails via server. These requirements are as follows:Dedicated simple mail transfer protocols (SMTP) virtual servers for IMAP and POPclients:It will ensure the use of emails within a closed messaging environment. These arethe two most widely used mailbox access protocols which are generally used bycommercial software manufacturers (Jing and et.al., 2014.). So, it will reduce thepossibilities arriving anonymous emails. Mailbox is considered as the simplest methodwhich allow users to access the mailbox and retrieve the messages. POP3 is the latestversion which reduces the security risks but although it also had to face limitations as popserver deletes those messages or email files which ones retrieve to user. So users find itdifficult to access those documents another time. So there is great need to configure POPmessages so that it cannot be deleted from server. Internet message access protocol wasintroduced to address all the limitations of POP. IMAP provides a centrally located serverwhich respond to multiple clients who wants to access the mails of a particular user. Ithad fulfilled the security requirement of Email services which works on the principle ofCRAM (challenge-Response Authentication Mechanism). So IMAP dedicated servershave proved the way to communicate with different users within an enclosed area.Restricting submissions to distribution lists and users: This security hardeningrequirement is needed to prevent formulation of non-trusted senders. It restrictsunauthorised users to communicate with internal -only distribution list. This methodprotects the organisation from the anonymous emails and it does not allow spammessages to enter into the internal environment. This Security requirement will ensuresubmission of messages to those people who are involved in the distribution lists.Formulate the use of Digitally sign and encrypted form of email documents:Thisrequirement methodology will protect the flow of data and information fromunauthorised users. Digital signature and Encryption of emails provide the highestsecurity to Application system (Sajid, Abbas and Saleem, 2016). This is a majorrequirement of organisations to secure their commercial messages or confidential datafrom the external users. This security hardening requirement prevents the data from otherinterruptions like cybercrimes who aim at stealing the confidential information of thefirm.2
Security Hardening Requirements and Contents of Operating System and Application Security Contents_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
E-Communication Exchange Server Assignment 2022
|7
|1539
|15

Network Security Tools Report
|7
|1141
|38

Reflective Critical Analysis | Web Application Security
|5
|1203
|10

Introduction to Information Assurance Assignment 2022
|5
|716
|15

VPN: Hardware vs Software, Operation, and Security Protocols
|20
|4092
|72

Computer Security Assignment Solved
|10
|2742
|144