Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | Next revision Both sides next revision | ||
syssec:final_project [2019/11/15 01:12] aibekzhy |
syssec:final_project [2019/11/15 03:28] sjames5 [Part III - Risk (30 pts)] Alex graduated |
||
---|---|---|---|
Line 57: | Line 57: | ||
* **Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers** - provide proof that you hardened a certain aspect of your system (example: SSH config file set to reject logins after X failed attempts) | * **Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers** - provide proof that you hardened a certain aspect of your system (example: SSH config file set to reject logins after X failed attempts) | ||
* **Maintenance, Monitoring, and Analysis of Audit Logs** - Provide a screenshot of 3 log files (Actually open the files) | * **Maintenance, Monitoring, and Analysis of Audit Logs** - Provide a screenshot of 3 log files (Actually open the files) | ||
- | * etc... Reach out to Alex/Jay if you are unsure about anything! | + | * etc... Reach out to Jay if you are unsure about anything! |