Discuss the total threat coverage for the operating systems

Assignment Help Operating System
Reference no: EM131886086

Assignment

One of the first tasks in the development of operating system security policies is to identify the tools that can be used for the detection and prevention of security threats to the organization's operating systems. The operating systems form the core of the system operations, and security violations at the operating system-level could compromise every aspect of the system's and organization's IT resources.

For this assignment, you will conduct an analysis and selection of tools that would be appropriate for the detection of operating system security threats in the organization's systems. You will also summarize the strengths and weaknesses of the built-in security of each of the 3 OS categories (UNIX, open source, and Windows) so that you will be able to determine which areas may need additional security support from other tools.

The following are the project deliverables:

• Update the Operating Systems Security Policies document title page with a new date and project name.
• Update the previously completed sections based on the instructor's feedback.
• New Content: Security Threat Detection

o Security Tool Analysis

- Review and identify at least 3 tools that would be effectively used in the detection and prevention of operating system security threats in the organization's systems.

- Include the types of threats that the tools identify.

- Discuss the total threat coverage for the operating systems provided by these tools.

- Given that implementation of security tools requires significant investment, management will likely be reluctant to approve them unless the investment can be justified. As part of your analysis, describe why these tools are necessary for the company and how the investment can be justified to management.

o Built-in Security Analysis

- Summarize the strengths and weaknesses of the built-in security of each of the 3 major OS categories (UNIX, open source, and Windows).

- Discuss how the weaknesses can be strengthened using the tools identified in the Security Tool Analysis section.

• Be sure to update your table of contents before submission.

Attachment:- Natasha-Manning-Redmond.rar

Reference no: EM131886086

Questions Cloud

Demonstrate your understanding of crime prevention : Demonstrate your understanding of crime prevention programs and the role crime prevention plays in the overall criminal justice system.
Describe the key elements of construction practice : Describe the key elements of construction practice? How can process patterns assist a development team build software products efficiently?
How competencies and knowledge support career advancement : What competencies were you able to develop in researching and writing the Comprehensive Project due in Unit 5? How will these competencies and knowledge.
Discuss how the organization uses volunteers : What other partnerships (companies, businesses, organizations, universities, etc.) does the organization have? What are the benefits of these partnerships?
Discuss the total threat coverage for the operating systems : Discuss the total threat coverage for the operating systems provided by these tools. Update the previously completed sections based on the instructors feedback.
The main criticisms of community policing in ferguson : What steps can communities take to make community policing a successful strategy for law enforcement?
Develop an attack plan that covers the given criteria : Develop an attack plan that covers these criteria. Find tools on the web that could help you find information about systems/networks, etc.
Describe the challenges you would face in policing : As stated in your text there are about 566 federally recognized tribal governments within the United States.
What is the purpose of nonroutable protocols : In your opinion, what is the purpose of nonroutable protocols? Is there a legitimate reason for having nonroutable protocols?

Reviews

Write a Review

Operating System Questions & Answers

  Given a short-term scheduling algorithm

Explain why this algorithm favors I/O bound programs and yet does not permanently deny processor time to processor bound programs.

  About it infrastructure

IT infrastructure

  C program that prompts the user to enter some data

If the user enters -999 as the first account number, the program should simply exit, and display an appropriate message of your choice.

  What are the advantages of using dynamic loading

Briefly describe the segmentation memory management scheme. How does it differ from the paging memory management scheme in terms of the user's view of memory - What are the advantages of using dynamic loading?

  Describe the specific security concerns or risks

Describe the specific security concerns or risks that your chosen operating system is exposed to and how you plan to mitigate the risk that each one presents.

  About linux operating system

your netlab workstation then ssh to server.cnt1015.local with your college username (the account you used for the quizes).Create a directory called final in your home directory.

  Question regarding the linux flavors

Look up the different types of Linux and Unix and type up a 1 page listing them out what benefits do each have and where you found the OS at.

  Produce a two page report outlining the potential risks

Produce a 2 page report outlining the potential risks, and make suggestions for mitigation where possible for the following operating system/application.

  Currently the atm is idle

Currently the ATM is idle. Find the probabilities that, in 3 minutes, the ATM will be idle; will be serving one customer with no one in the queue; will be serving one customer with one customer waiting in the queue

  Create threads causing a racing condition

In your test program you will need to create 100 or more threads causing a racing condition. One racing condition example can be each thread constantly requests a PID in multiple iterations.

  Identify an appropriate hardware backup solution for server

Identify an appropriate hardware backup solution for the server computer, as well as a process to ensure that backups are performed regularly, and are secure.

  Benefits of the just in time inventory management system

Determine what does just in time inventory management have to do with the Carle Heart Center in Urbana, Illinois?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd