Location

https://ccse.kennesaw.edu/computing-showcase/cday-programs/fall23program.php

Streaming Media

 
Media is loading

Event Website

https://mchico12.wixsite.com/it4983-capstone-fall/

Document Type

Event

Start Date

30-11-2023 4:00 PM

End Date

30-11-2023 7:30 PM

Description

The team was assigned the responsibility of securing a web server. This business website is hosted on a technology stack comprising Apache, MariaDB, Red Hat Linux, and PHP. Our initial task involves conducting a comprehensive assessment of the provided network to identify vulnerabilities and assess potential risks. Subsequently, we will develop a robust security policy plan in alignment with the standards set forth by the National Institute of Standards and Technology (NIST) and industry best practices. Once the plan was approved, our group will proceed to implement the recommended changes to fortify the network, ensuring it complies with industry best security practices. In the final phase, the team engaged in a red/blue team cyber security ethical hacking exercise, involving our network and other team. We will attempt to gain access to other team's server, protect ours by promptly addressing any verified security breach utilizing the team's incident response procedure.

Share

COinS
 
Nov 30th, 4:00 PM Nov 30th, 7:30 PM

UC-523: IT 4983 Server Hardening

https://ccse.kennesaw.edu/computing-showcase/cday-programs/fall23program.php

The team was assigned the responsibility of securing a web server. This business website is hosted on a technology stack comprising Apache, MariaDB, Red Hat Linux, and PHP. Our initial task involves conducting a comprehensive assessment of the provided network to identify vulnerabilities and assess potential risks. Subsequently, we will develop a robust security policy plan in alignment with the standards set forth by the National Institute of Standards and Technology (NIST) and industry best practices. Once the plan was approved, our group will proceed to implement the recommended changes to fortify the network, ensuring it complies with industry best security practices. In the final phase, the team engaged in a red/blue team cyber security ethical hacking exercise, involving our network and other team. We will attempt to gain access to other team's server, protect ours by promptly addressing any verified security breach utilizing the team's incident response procedure.

https://digitalcommons.kennesaw.edu/cday/2023fall/Undergraduate_Capstone/21