Cyber Track Cubs Project 1 Project Starter Template
Cyber Track Cubs Project 1 Project Starter Template
Securing a Computer
System
Securing a Computer System
Scenario
Congratulations!
You have been hired to audit the security for the PC used
at your friend’s business: Joe's Auto Body. Joe provides car
repair services throughout the tri-state area. He's had
previous employees use it for activities unrelated to work
(e.g., web browsing, personal email, social media, games,
etc.), and he now uses it to store his critical business
information. He suspects that others may have broken
into it and could be using it to transfer files across the
internet. He has asked that you secure it for him
according to industry best practices so that it can again
be used as a standard PC.
2 Processor
3 Install RAM
4 System Type
5 Windows Edition
6 Version
7 Installed on
8 OS build
Software
Another common early step in securing is taking an
inventory of software or applications installed on a
computer system. These are programs outside of the
standard operating system. Please list five applications
running on this PC.
5
Accounts
As part of your security assessment, you should know
the user accounts that may access the PC. Please list the
accounts, name, and access level for the accounts on
this PC.
1.
Principles of Secure Design
Consider the OWASP Principles of Secure Design. Choose
two principles and describe in 2 to 3 sentences (total)
how they apply to what Joe can use on JoesPC to
accomplish a more secure environment.
1.
System and Security: Firewall
● JoesAuto
● Jane Smith (Joe’s Assistant)
Recommendatio Explanation
n
How should
users
authenticate
their identity?
What Access
Rights/Permission
s should Joe
have?
What Access
Rights/Permission
s should Jane
have?
Users- Part 3
2
Default Browser
2
Part 5: Securing Files
Securing Files