Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
syssec:final_project [2019/11/15 01:12] aibekzhy |
syssec:final_project [2019/11/18 01:32] sjames5 ↷ Page moved and renamed from syssec_final_project to syssec:final_project |
||
---|---|---|---|
Line 57: | Line 57: | ||
* **Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers** - provide proof that you hardened a certain aspect of your system (example: SSH config file set to reject logins after X failed attempts) | * **Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers** - provide proof that you hardened a certain aspect of your system (example: SSH config file set to reject logins after X failed attempts) | ||
* **Maintenance, Monitoring, and Analysis of Audit Logs** - Provide a screenshot of 3 log files (Actually open the files) | * **Maintenance, Monitoring, and Analysis of Audit Logs** - Provide a screenshot of 3 log files (Actually open the files) | ||
- | * etc... Reach out to Alex/Jay if you are unsure about anything! | + | * etc... Reach out to Jay if you are unsure about anything! |