You work for a company that develops and markets crew planning and optimization software and provides training and consulting in this area for the airline industry. Currently, the firm is….
describe the differences between a scan conducted using CIS
- Domain Controller: Using the selected CIS settings/policies/security options from Part 1, follow the procedures in the “ITT-430 Domain Controller Group Policy Management Instructions,” to import and apply the new Group Policy settings throughout the domain.
- Deploy changes throughout domain.
- In the same MS Word document for Part 1, present a 250- to 500-word summary to include (a) security controls that were applied to minimize systems risks, threats, and vulnerabilities (b) baseline countermeasures that should be in place and (c) preventive controls needed to decrease the threat of unintentional errors or unauthorized access. In addition, provide screenshots as directed.
- Then, in 250–500 words, describe the differences between a scan conducted using CIS (Center Internet Security) Benchmarks to one using Security Technical Implementation Guides (STIGs) Benchmarks as well as defensive measures that can protect information within the network.