Create digital files by employing a template

Assignment Help Operating System
Reference no: EM131909095

Operating Systems Course Project

Overview: During the Hands-On Lab, you focused on operating system (OS) security fundamentals. In fact, throughout a few of the labs you have implemented some key security features - user authentication, user and group management, resource sharing, permissions, etc. This is important because security needs to be built in to several areas of an OS instead of being viewed as an afterthought. In this module's course project assignment, you will begin developing a Security Policy for SOHO Inc. A Security Policy for an organization combines several different elements into one master document, which is the Security Policy. One of these sub-policies is a Software Installation Policy, which defines the requirements around installation of third party software on company owned devices. Develop a Software Installation Policy that includes the built-in tools to control software installation on Windows 10, a popular Linux distribution, and Mac OS X 10.x systems. You are not creating an individual policy for each OS; rather, you will create a single policy that includes the tools for each OS (e.g. Windows 10 - local security policy, Linux - SELinux, etc.). This plan will also include a patch management plan for OS/software updates. As a reminder, SOHO Inc. has the following requirements as it relates to their security needs:

  • At this time, built-in security mechanisms are sufficient for data, end-user, and desktop security.

Objectives:

The overall objective of this project is to develop a Software Installation Policy; however, you will also demonstrate the ability to:

  • Independently navigate to and open an Internet browser to use its interface to access simple Internet Technology.
  • Evaluate digital resources by relying on search engine results and distinguishing relevant digital materials from irrelevant materials.
  • Create digital files by employing a template to create a document in the proper file format that incorporates built-in software tools for integrating graphics and other enhancements.
  • Collaborate digitally using digital tools to enter contact information and directions to access specific websites to retrieve digital resources.
  • Select credible sources and cite them according to APA standards.

Resources: Utilize the Windows Snip tool to capture the requested screenshots and insert those screenshots where indicated. If you need assistance with using the Snip tool, please refer to this tutorial.

Software Installation Policy: Utilize the Rich Text field below to define the Software Installation Policy that includes the tools for each OS (e.g. Windows 10 - local security policy, Linux - SELinux, etc.). This plan will also include a patch management plan for OS/software updates. In the field, you can incorporate section headers, font adjustments, screenshots, etc. If you use any source material, use in-text citations, per APA standards, and ensure the sources are included in References section at the end of this document.

References: Use this field to cite your credible reference sources per APA standards.

Reference no: EM131909095

Questions Cloud

What is the distinctive competence : What is the distinctive competence of the following companies? Explain how a distinctive competence in operations can be the basis for competition.
What are practical consequences of lack of strategic linkage : How has globalization affected its operations and its supply chain? What are the practical consequences of a lack of strategic linkage between the business.
How the process view of an organization uncover the need : In the following operations, isolate a system for analysis and define customers, services produced, suppliers, and the primary process flows.
Explain the differences between capacity and flow rate : Provide a definition of a bottleneck. Why is it important to find the bottleneck? Explain the differences between capacity, flow rate, and demand.
Create digital files by employing a template : CDA 1330C - Operating Systems Course Project. Create digital files by employing a template to create a document in the proper file format
When does mill say that individuality should assert itself : In your own words, explain Mill's position on the value of custom and tradition as guides for conduct? To what extent do you agree with him?
Deposit with no outstanding checks or uncleared deposits : You have $49,762 on deposit with no outstanding checks or uncleared deposits. What is your net float?
Post an explanation of what carters duty was : Definitions of moral obligation and the categorical imperative. Also consider how Kantians distinguish between right and wrong -
Describe service blueprinting in your own words : Provide a definition of a bottleneck. Describe service blueprinting in your own words, including examples of when it should be used.

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd