Discuss the total threat coverage for the operating systems

Assignment Help Operating System
Reference no: EM132387645

Assignment: Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Conduct research using the library and Internet for information about tools for operating system security threat detection.

• Based on your research, select 1 of the tools that you found, and describe how the tool provides information that is useful in the detection of potential and actual security breaches.

• Provide at least 1 example of how the information would be used in a real-life scenario.

Project ( 3-4 ) pages of content:

One of the first tasks in the development of operating system security policies is to identify the tools that can be used for the detection and prevention of security threats to the organization's operating systems. The operating systems form the core of the system operations, and security violations at the operating system-level could compromise every aspect of the system's and organization's IT resources.

For this assignment, you will conduct an analysis and selection of tools that would be appropriate for the detection of operating system security threats in the organization's systems. You will also summarize the strengths and weaknesses of the built-in security of each of the 3 OS categories (UNIX, open source, and Windows) so that you will be able to determine which areas may need additional security support from other tools.

The following are the project deliverables:

1. Update the Operating Systems Security Policies document title page with a new date and project name.

2. Update the previously completed sections based on the instructor's feedback.

3. New Content: Security Threat Detection

a. Security Tool Analysis

• Review and identify at least 3 tools that would be effectively used in the detection and prevention of operating system security threats in the organization's systems.

• Include the types of threats that the tools identify.

• Discuss the total threat coverage for the operating systems provided by these tools.

• Given that implementation of security tools requires significant investment, management will likely be reluctant to approve them unless the investment can be justified. As part of your analysis, describe why these tools are necessary for the company and how the investment can be justified to management.

b. Built-in Security Analysis

• Summarize the strengths and weaknesses of the built-in security of each of the 3 major OS categories (UNIX, open source, and Windows).

• Discuss how the weaknesses can be strengthened using the tools identified in the Security Tool Analysis section.

4. Be sure to update your table of contents before submission.

Reference no: EM132387645

Questions Cloud

Discuss the future of information delivery : discuss the future of information delivery.
What role it innovation play in a company strategic plan : In 175 words or more discuss what role IT innovation should play in a company's strategic plan, and why? Should a company plan to do something it has never.
What three types of buying situations : Describe a strategy or tactic the salesperson might employ for one of the situations.
Identifying an organization resources : According to Robert M. Grant, in his book Foundations of Strategy, what is the importance of identifying an organization's Resources and Capabilities?
Discuss the total threat coverage for the operating systems : Discuss the total threat coverage for the operating systems provided by these tools. Given that implementation of security tools requires significant investment
Contingent selection and give personal : Compare/Contrast initial/substantive, and contingent selection and give personal examples of how each of these should be used in the external selection
Which you would have benefitted from mentoring : Think about a situation in which you would have benefitted from mentoring
Tedtalk of regina hartley on the selection process : Considering the TedTalk of Regina Hartley on the selection process:
Describe organizational agility : Describe organizational agility. What 2 organizational characteristics contribute the degree of an organization's agility?

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd