Analyze the security features of linux

Assignment Help Operating System
Reference no: EM13803686

Current Attack Vectors and Secure Network Design

A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 employees within the next 18 months and is preparing to build his systems infrastructure across three (3) locations: one (1) primary headquarters and two (2) small satellite offices. All three (3) locations will occupy one (1) entire floor of a multitenant building. Your friend has asked your opinion regarding major technology choices that he must make for his business, such as operating systems, mobile devices, cloud services, and wireless networking.

Write a six to ten (6-10) page paper in which you:

  1. Analyze the security features of Linux, Macintosh, and Windows operating systems, and decide which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Justify your response.
  2. Discuss the primary security concerns surrounding USB and other portable devices, and prioritize the major risks that your hypothetical friend must consider based on the level of potential harm the identified security concern may cause. 
  3. Take a position on whether you believe a network with wireless access points and clients, or a predominantly wired network, is more susceptible to a network attack. Suggest the tools that you would use to penetrate a wireless network in comparison to a network without wireless access points. Justify your response.
  4. Consider the use of cloud providers to allow for access to data for employees and potential clients. Examine the general security concerns for cloud-based solutions, and validate whether or not you would consider the use of a cloud provider an optimal solution for this scenario.
  5. Describe what you believe to be the most effective attack against mobile computing devices, and choose one (1) tool that a hacker could use to carry out this attack. Support your response with related examples of the chosen tool in use.
  6. Recommend the minimum physical and technical controls for protecting the company's intellectual property from both internal and external threats. Provide a rationale for your response.
  7. Consider the tools explored throughout the course, and suggest what you believe to be the three (3) most useful tools for a hacker to utilize. Justify your response.
  8. Design a floor plan of each of the three (3) offices. Include locations of data center(s), telecommunication closet(s), end-user areas, conference rooms, networking equipment, security controls, etc. Use the graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. 
  9. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13803686

Questions Cloud

What types of activities are conducted by interest group : What types of activities are conducted by your interest group. Provide examples of activities undertaken by the group within the last 12 months. Activities can include lobbying, television or radio spots
Contrasting different hosting solutions : Write a mini research paper comparing and contrasting different hosting solutions. Identify two companies on the web that provide hosting solutions and compare:
Describe where you see each of the five conflicts in life : Describe where you see each of the five conflicts in everyday life (e.g., in social media, music, literature, or online learning). How does conflict appear in two or three of the various venues mentioned above?
Assignment the social contract theory of john locke : Individual Assignment The Social Contract Theory of John Locke
Analyze the security features of linux : Analyze the security features of Linux, Macintosh, and Windows operating systems, and decide which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Justify your response
Compute number of lines of the address bus : Compute number of lines of the address bus connecting the RAM and the CPU - what is the maximum size in Bytes for RAM.
How does our current party system impact elections : How does our current party system impact elections. How can a minor party play a part in an election
Write an essay about movie twilight : Write an essay about movie "Twilight".
Explain the evolution of political parties : Explain the evolution of political parties from the Federalists and Democratic-Republicans to the political parties that exist today.

Reviews

Write a Review

Operating System Questions & Answers

  Automate or automated patch deployment

Discuss and define Automate or Automated patch deployment?

  A computer has a cache, main memory, and a disk

A computer has a cache, main memory, and a disk. If a referenced word is in the cache, 20 ns are required to access it. If it is in main memory but not in the cache (called cache miss)

  Determine the average seek time of traversed disk

Traversed Disk receives request to access random sector on random track. Suppose head starts at track 0. Determine the average seek time?

  Describe the processes involved in the management

Identify and describe the processes involved in the management of the services, disk quotas and security of both Windows and UNIX operating systems.

  Program that accepts or rejects applicants for seasonal jobs

Write a program that accepts or rejects applicants for seasonal jobs - To qualify for a job an applicant must be at least 16 years old and have two years work experience. Additionally, the applicant must either be able to life at least 40 pounds or..

  Question about atm networks

ATM networks use a token bucket program to regulate traffic. A new token is put into the bucket every one usec so ATM cells can be sent during this period.

  Construct resource allocation graph with processers

Construct a resource allocation graph with the following processers and resources, the system consists of four processers P1, P2, P3, and P4 and five resources R1, R2, R3, R4, and R5.

  Question about software and staff training

As was stated before, the corporation X is going to expand its data system. To do this, it is going to choose and buy new hardware and software and retrain workers.

  What speedup could be expected in the steady state

What speedup could be expected in the steady state by using a merging write buffer instead of a nonmerging buffer when zeroing memory by the execution of 64 bit stores if all other instructions could be issued in parallel with the stores and the b..

  Explain limitations of ray tracing

There are many ways to render an object and the selection depends on the use the work will be put to

  Circular-wait scheme with various deadlock-avoidance scheme

Compare the circular-wait scheme with thevarious deadlock-avoidance schemes  banker's algorithm)

  Command to rename all files in your entire system

Write a command to rename all files in your entire system named temp.old to New - Count the number of lines in file F1 that has the word unix

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd