How viruses - adware and spyware would impact organization

Assignment Help Management Information Sys
Reference no: EM131148640

For the assignments in this course, you will not be implementing an operating systems security policy; rather, you will be developing a comprehensive operating systems security policies document. Your first task in this process will be to select an organization or identify a hypothetical organization to use as the basis of your projects. You will also create the shell document for the final project deliverable that you will be working on during each unit. As you proceed through each project phase, you will add contents to each section of the final document to gradually complete the final project delivery. Appropriate research should be conducted to support the development of your document, and assumptions may be made when necessary.

Use MS Word
Title Page
· Course number and name
· Project name
· Student name
· Date
Table of Contents
· Use auto generated TOC
· Separate page

· Maximum of 3 levels deep

· Be sure to update fields of TOC so it is up-to-date before submitting project

Section Headings (Create each heading on a new page with TBD as the content except for the sections listed under New Content below.)

· Project Outline
· Operating System Security Tools
· Security Threat Detection
· Secure Communications
· Virus Protection
· Security Management

New Content

Project Outline and Requirements

· Give a brief description of the organization (can be hypothetical) where the operating systems security policies will be implemented. Include company size, location(s), and other pertinent information.

· Identify the systems in the organization (i.e., the type and number of computer systems and operating systems used, along with a top-level view of the infrastructure). A network diagram would be useful for this purpose, but the diagram should be pasted into your Word document.

· Your project must assume that the organization has UNIX, open source, and Windows operating systems in its computing environment, so be sure to include all 3 categories in the systems overview.

· Identify and describe any outside connections to the internal systems.

· Summarize the benefits the company would realize through the implementation of operating systems security policies.

· Material can be taken from the approved proposal submitted to the instructor.

· Be sure that this project is approved by the instructor.

Operating System Security Tools

· Based on the systems overview, identify and describe at least 3 security tools for each OS category (UNIX, open source, and Windows) that can be used at the operating system level to protect the systems, users, and data from security threats.

· The tools can be part of the OS or third-party tools. Some examples would include firewalls, account management, and port access management.

New Content: Security Threat Detection

Security Tool Analysis

· Review and identify at least 3 tools that would be effectively used in the detection and prevention of operating system security threats in the organization's systems.

· Include the types of threats that the tools identify.

· Discuss the total threat coverage for the operating systems provided by these tools.

· Given that implementation of security tools requires significant investment, management will likely be reluctant to approve them unless the investment can be justified. As part of your analysis, describe why these tools are necessary for the company and how the investment can be justified to management.

Built-in Security Analysis

· Summarize the strengths and weaknesses of the built-in security of each of the 3 major OS categories (UNIX, open source, and Windows).

· Discuss how the weaknesses can be strengthened using the tools identified in the Security Tool Analysis section.

New Content: Secure Communications

Communications Summary

· Summarize each of the major types of computer communications used by the organization's systems.

· These communications should include computer-to-computer communications and user-to-computer communications.

· Provide a review of the potential security issues related to the internal and external communications.

· Discuss how company communications policies can play an important role in the reduction of communication security risks. Include specific examples and real-world case studies to support your discussion.

Tools and Techniques

· Identify and describe at least 3 tools or techniques that can be used to reduce the communications security threats for any of the OS categories (UNIX, open source, and Windows).

· For each tool or technology, specify a typical use case to demonstrate how the tool or technology can be used.
New Content: Virus Protection

Tools

· Describe the major systems in the organization that may be susceptible to virus threats.

· These systems should include all 3 operating systems categories (Unix, open source, and Windows) from the initial project requirements.

· For each system category, provide an analysis and recommendation of appropriate virus protection tools.

· Your analysis should include requirements and a comparison of features, cost, and any other relevant factors for at least 3 alternatives for each operating system; a final recommendation for an appropriate tool; and justification for your selection.

Policies

· Discuss how viruses, adware, spyware, and malware would impact your organization.

· Prepare at least 5 policies that will help reduce the threat of viruses, adware, spyware, and malware within the organization.

· The policies should include detailed steps to be followed.

· Provide details of how each policy will be effective in the reduction of these threats.

New Content:

Security Management

· Develop a security incident response policy for the organization.

· Provide an evaluation and recommendation for tools and processes to help analyze and track security threats and incident responses for all

3 operating systems categories (UNIX, open source, and Windows).

· Provide an evaluation and recommendation for forensics tools and policies to use in response to security incidents for all 3 operating systems categories (UNIX, open source, and Windows).

Security Cost/Benefit Analysis

· Provide a cost/benefit analysis for the tools and processes recommended throughout the Operating Systems Security Policies document versus the cost to the organization of security incidents.

· Add a long-term cost/benefit analysis that includes expected changes in the organization that might affect the costs and benefits of the recommended tools and processes.

Operating Systems Security Policies document, final draft

· Review the entire document for any changes and improvements that you would like to make.

· Ensure that this final version of the plan is sufficiently detailed to allow the organization to confidently move forward with the implementation of the operating system security plan based on your recommendations.

· Any previous instructor feedback should be addressed with appropriate changes.

Reference no: EM131148640

Questions Cloud

Describe how electric current is generated and transported : Describe how an electric current is generated and transported. Assess the current state of our national grid in the United States, as well as any challenges in updating this grid.
Identify a general plan to recover from the incident : Identify additional software that will be required to monitor the network and protect key assets. Identify any security controls that need to be implemented to assist in mitigating risks. Mitigate all of the risks that were identified during the asse..
Describe the differences between temperature and heat : Describe the differences and similarities between temperature and heat. Analyze how heat transfer occurs during the processes of conduction and convection. Provide an example of where each occurs in natural physical systems.
Prepare a corporate tax return for 2015 : ACC 404 Corporate Tax Return Project. Using the following information, prepare a corporate tax return for 2015. It is due on Monday, August 1, 2016. You may work on it in a group with up to two other students (maximum of 3 students per group)
How viruses - adware and spyware would impact organization : Provide a review of the potential security issues related to the internal and external communications. Discuss how company communications policies can play an important role in the reduction of communication security risks. Include specifi..
Indicate whether each statement is true or false : One reason managers use the full cost of products as the cost base in their pricing decisions is to promote price stability.- When there is price discrimination, pricing is not linked closely to the cost of the product.
Prepare the cash budget for iguana : Iguana, Inc., manufactures bamboo picture frames that sell for $30 each. - Compute the budgeted cash payments for Iguana.- Prepare the cash budget for Iguana.
Conduct external research from reputable and quality sources : Write a report on how relevant legislation, codes of practice, ethical principles, and national standards affect marketing operations - Briefly describe the following statistical methods and techniques to evaluate marketing opportunities, including..
Describe the importance of rare earth elements in science : Describe the importance of rare earth elements in science and technology. Assess the most common uses of these elements, particularly as encountered in your daily life, as well as projections for future demand of these minerals resources.

Reviews

Write a Review

Management Information Sys Questions & Answers

  How it is possible for someone at minitrex to call customer

Explain how it is possible for someone at Minitrex to call a customer and not know (a) that this is a customer and (b) that this is the third time this week that they had been called?

  List network security measures to be implemented

Define the subnets (based on rooms, floor, department, or other criteria). For each subnet, explain which devices/groups/users/rooms will be on this subnet, and define the network address, subnet mask, and available IP addresses to be used by compu..

  Collaborative and individual writing processes

Collaborative and Individual Writing Processes and disadvantages of the collaborative writing process in 200 to 300 words. In what situations might an individual writing process be preferable?

  Advantages and disadvantages of the two systems

Summarize the advantages and disadvantages of the two systems. Recommend which system is the best choice to meet meaningful use requirements in this particular setting

  How technologies change your business

How might the Internet and related communication technologies change your business and What are some of the ways that information technology can improve productivity and performance in your business?

  How has e-commerce revolutionized commerce

How has e-commerce revolutionized commerce and What is social commerce?

  Answer the following question using apa style and citing at

answer the following question using apa style and citing at least one credible source per answer with in-text and

  Strategic planning helpcomplete the strategic toolkit as it

strategic planning helpcomplete the strategic toolkit as it relate specifically to strategy implementation of the

  Study of is from a business perspective

Answer to Information system - What is the focus of the study of IS from a business perspective

  Explain the concept of dos in information management

Explain the types of events that result in faulty service, a type of security loss. Explain the concept of denial of service (DOS) in information management. The patterns, relationships, and trends identified by 131 systems are called business intell..

  Research essay - vulnerability to a terrorist attack

Pick one of thiese topic: vulnerability to a terrorist attack, Are We Ready for the Next 9/11? or/and companies which deal with dangerous products, such as the chemical industry; sports franchises that fill stadiums and create large public crowds ..

  Kudler food fine foods recommendations for software design

kudler food fine foods recommendations for software design hardware networks1. detailed design process and design

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd