Discuss about the security considerations

Assignment Help Computer Engineering
Reference no: EM132069655

Question: Primary Task Response

Your first task is to post your own Key Assignment outline to the discussion area so that other students are able to review your plan. Attach your document to the main discussion post, and include any notes that you feel are appropriate. The purpose of this assignment is to help improve the quality of the Key Assignment draft that you will complete next week.

Key Assignment Draft

As is true with all components in any computing environment, security considerations are paramount for operating systems as well. Performing risk assessments and identifying mitigation strategies in advance is a way to ensure that security has been addressed at the operating system level. Virtualized operating systems bring a new set of challenges.

Assignment: For this assignment, you will be compiling your draft of your Key Assignment by incorporating all of the feedback you have received from your instructor and classmates in this week's Discussion Board. You will also be adding new content related to identifying security risks and potential mitigation strategies.

The project deliverables are the following:

1. Update the Operating Systems Design Document title page with the new date and project name.

2. Update the previously completed sections based on instructor feedback.

3. New content (2-3 pages) regarding security should include the following:

• A description of the areas of an operating system that should be evaluated for performing a risk assessment

• A thorough description of at least 5 risks that pertain to your selected operating system solution

• A description of the risk mitigation approach for each risk

Reference no: EM132069655

Questions Cloud

Data science major assignment : You are required to present your research in the final week of semester. You will be assigned a time and all group members must attend and present.
What is the entry for the dividend declaration : The board of directors of Capstone Inc. declared a $.40 per share cash dividend on its $1 par common stock. What is the entry for the dividend declaration
Certainty equivalent of the real estate investment : What do you know about the certainty equivalent (for the couple) of the real estate investment?
What are the important elements to running the organization : Larger organizations need more clerical and administrative staff to keep the organization running smoothly.
Discuss about the security considerations : As is true with all components in any computing environment, security considerations are paramount for operating systems as well. Performing risk assessments.
Prepare the journal entry relating to the machine : Irwin decided to change to the straight-line method. Ignoring income taxes, prepare the journal entry relating to the machine for 2016
Market imperfections was there arbitrage opportunity : If there are no market imperfections, was there an arbitrage opportunity here? If so, how would you have exploited it?
What is the net income for the year : Common stock increased by $194 and retained earnings decreased by $120. What is the net income for the year?
Company from a strategic point of view : Write a comment using the concept learnt during the MBA strategic management course and say if you agree with the decision.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What problems contribute to read errors on magnetic tapes

What problems contribute to read/write errors on magnetic tapes? Are these problems also present with other magnetic storage media/devices?

  Identify modules from cpan that can support a gui

Identify modules from CPAN that can support a graphical user interface (GUI), network protocol, and database adapters.

  Construct a bipartite graph with six nodes and eight edges

Construct a bipartite graph with six nodes and eight edges that has a three-edge matching, or prove that none exists.

  What three properties characterize lists

What does it mean to say that the Delete operation is ambiguous? What three properties characterize lists? How were we able to make the list generic?

  What could be causing the given peak activity

You note that peak network utilization occurs at approximately noon, when most of your employees are on lunch break. What could be causing this peak activity?

  Compare the speed of the multiplier built of ssi ics

Extend the 4 X 4 multiplier of this chapter to an 8-by-8 multiplier. Compare the speed of this multiplier built of SSI ICs of your choice.

  Distinguish between information and data

Distinguish between information and data. Write a top-down design for sorting a list of names into alphabetical order.

  Compose an outline with complete headers

Compose an outline with complete headers and brief 1-sentence paragraphs towards the Week 7 Project Paper assignment found under Assignments.

  How many gate delays are there in the longest path

How many gate delays are there in the longest path from some input to some out-put of a 64-bit adder using 4-bit carry lookahead groups and a multiple level str

  Write a driver program to test your package

Write a driver program to test your package. Why do we use types instead of subtypes for these six units? How would you classify this package?

  Why is security software necessary in operating systems

What is an operating system? Why are audits of this area viewed as complex? Why is security software necessary in operating systems?

  Write a module call to a module named getpints

Write a module call to a module named getPints that passes the pints array. Additionally, write a module header named getPints that accepts the pints array. (Reference: Passing an Array as an Argument to a Function, page 295).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd