You provide a lecture to the working group regarding the importance of security education, awareness, and training due to the oft-quoted security maxim that users/humans are the weakest link in the security chain. While making users aware of security risks and training them how to protect company assets will reduce risk, it is important to put technical controls in place to protect the operating systems and applications that employees use every day.
Discuss the importance of “hardening” the PCS client workstations and servers. Make recommendations for operating system hardening options and describe how these are related to the concept of “system-specific policies” discussed earlier in the course. One of the working group members blurts out that antivirus protection is a waste of computing resources and patching applications takes too much time. Be sure to address these two concepts in your initial thread. Include at least one research reference and associated in-text citation using APA standards. In your replies to your peers further discuss the importance of software security.
Sample Solution
Hardening a PCS (personal computer system) is important for the security of all users and systems. By hardening, we are applying technical measures to protect the system from potential malicious attacks or misuse. Hardening helps reduce the attack surface of PCS workstations and servers by disabling unnecessary services, closing ports, removing applications that may be vulnerable to exploitation, patching software to its latest version, updating passwords regularly, and installing antivirus protection. It also helps ensure only authorized users have access to sensitive data or systems. Through hardening techniques like these, organizations can protect their networks from external threats such as malware and hacking attempts while reducing internal risks posed by negligent or malicious employees.
Sample Solution
Hardening a PCS (personal computer system) is important for the security of all users and systems. By hardening, we are applying technical measures to protect the system from potential malicious attacks or misuse. Hardening helps reduce the attack surface of PCS workstations and servers by disabling unnecessary services, closing ports, removing applications that may be vulnerable to exploitation, patching software to its latest version, updating passwords regularly, and installing antivirus protection. It also helps ensure only authorized users have access to sensitive data or systems. Through hardening techniques like these, organizations can protect their networks from external threats such as malware and hacking attempts while reducing internal risks posed by negligent or malicious employees.
Firstly, Vittola argues after a war, it is the responsibility of the leader to judge what to do with the enemy (Begby et al (2006b), Page 332).. Again, proportionality is emphasised. For example, the Versailles treaty imposed after the First World War is questionably too harsh, as it was not all Germany’s fault for the war. This is supported by Frowe, who expresses two views in jus post bellum: Minimalism and Maximalism, which are very differing views. Minimalists suggest a more lenient approach while maximalist, supporting the above example, provides a harsher approach, punishing the enemy both economically and politically (Frowe (2010), Page 208). At the last instance, however, the aim of war is to establish peace security, so whatever needs to be done can be morally justified, if it follows the rules of jus ad bellum.
In conclusion, just war theory is very contestable and can argue in different ways. However, the establishment of a just peace is crucial, making all war type situation to have different ways of approaching (Frowe (2010), Page 227). Nevertheless, the just war theory comprises of jus ad bellum, jus in bello and jus post bellum, and it can be either morally controversial or justifiable depending on the proportionality of the circumstance. Therefore, there cannot be one definitive theory of the just war but only a theoretical guide to show how wars should be fought, showing normativity in its account, which answers the question to what a just war theory is.