Location
https://ccse.kennesaw.edu/computing-showcase/cday-programs/fall23program.php
Streaming Media
Event Website
https://mchico12.wixsite.com/it4983-capstone-fall/
Document Type
Event
Start Date
30-11-2023 4:00 PM
End Date
30-11-2023 7:30 PM
Description
The team was assigned the responsibility of securing a web server. This business website is hosted on a technology stack comprising Apache, MariaDB, Red Hat Linux, and PHP. Our initial task involves conducting a comprehensive assessment of the provided network to identify vulnerabilities and assess potential risks. Subsequently, we will develop a robust security policy plan in alignment with the standards set forth by the National Institute of Standards and Technology (NIST) and industry best practices. Once the plan was approved, our group will proceed to implement the recommended changes to fortify the network, ensuring it complies with industry best security practices. In the final phase, the team engaged in a red/blue team cyber security ethical hacking exercise, involving our network and other team. We will attempt to gain access to other team's server, protect ours by promptly addressing any verified security breach utilizing the team's incident response procedure.
Included in
UC-523: IT 4983 Server Hardening
https://ccse.kennesaw.edu/computing-showcase/cday-programs/fall23program.php
The team was assigned the responsibility of securing a web server. This business website is hosted on a technology stack comprising Apache, MariaDB, Red Hat Linux, and PHP. Our initial task involves conducting a comprehensive assessment of the provided network to identify vulnerabilities and assess potential risks. Subsequently, we will develop a robust security policy plan in alignment with the standards set forth by the National Institute of Standards and Technology (NIST) and industry best practices. Once the plan was approved, our group will proceed to implement the recommended changes to fortify the network, ensuring it complies with industry best security practices. In the final phase, the team engaged in a red/blue team cyber security ethical hacking exercise, involving our network and other team. We will attempt to gain access to other team's server, protect ours by promptly addressing any verified security breach utilizing the team's incident response procedure.
https://digitalcommons.kennesaw.edu/cday/2023fall/Undergraduate_Capstone/21