Review Questions 12.1 What are the basic steps needed in the process of securing a system? The basic steps needed in the process of securing a system (from [SCAR08]) are: •assess risks12.2 What is the aim of system security planning? 12.3 What are the basic steps needed to secure the base operating system? identified security needs of the system by: removing unnecessary services, applications, and12.4 Why is keeping all software as up to date as possible so important?
12.5 What are the pros and cons of automated patching? 12.6 What is the point of removing unnecessary services, applications, and protocols? 12.7 What types of additional security controls may be used to secure the base operating system?12.8 What additional steps are used to secure key applications? 12.9 What steps are used to maintain system security?
You've reached the end of your free preview.
Want to read all 13 pages?
- Winter '15