How viruses - adware and spyware would impact organization

Assignment Help Management Information Sys
Reference no: EM131148640

For the assignments in this course, you will not be implementing an operating systems security policy; rather, you will be developing a comprehensive operating systems security policies document. Your first task in this process will be to select an organization or identify a hypothetical organization to use as the basis of your projects. You will also create the shell document for the final project deliverable that you will be working on during each unit. As you proceed through each project phase, you will add contents to each section of the final document to gradually complete the final project delivery. Appropriate research should be conducted to support the development of your document, and assumptions may be made when necessary.

Use MS Word
Title Page
· Course number and name
· Project name
· Student name
· Date
Table of Contents
· Use auto generated TOC
· Separate page

· Maximum of 3 levels deep

· Be sure to update fields of TOC so it is up-to-date before submitting project

Section Headings (Create each heading on a new page with TBD as the content except for the sections listed under New Content below.)

· Project Outline
· Operating System Security Tools
· Security Threat Detection
· Secure Communications
· Virus Protection
· Security Management

New Content

Project Outline and Requirements

· Give a brief description of the organization (can be hypothetical) where the operating systems security policies will be implemented. Include company size, location(s), and other pertinent information.

· Identify the systems in the organization (i.e., the type and number of computer systems and operating systems used, along with a top-level view of the infrastructure). A network diagram would be useful for this purpose, but the diagram should be pasted into your Word document.

· Your project must assume that the organization has UNIX, open source, and Windows operating systems in its computing environment, so be sure to include all 3 categories in the systems overview.

· Identify and describe any outside connections to the internal systems.

· Summarize the benefits the company would realize through the implementation of operating systems security policies.

· Material can be taken from the approved proposal submitted to the instructor.

· Be sure that this project is approved by the instructor.

Operating System Security Tools

· Based on the systems overview, identify and describe at least 3 security tools for each OS category (UNIX, open source, and Windows) that can be used at the operating system level to protect the systems, users, and data from security threats.

· The tools can be part of the OS or third-party tools. Some examples would include firewalls, account management, and port access management.

New Content: Security Threat Detection

Security Tool Analysis

· Review and identify at least 3 tools that would be effectively used in the detection and prevention of operating system security threats in the organization's systems.

· Include the types of threats that the tools identify.

· Discuss the total threat coverage for the operating systems provided by these tools.

· Given that implementation of security tools requires significant investment, management will likely be reluctant to approve them unless the investment can be justified. As part of your analysis, describe why these tools are necessary for the company and how the investment can be justified to management.

Built-in Security Analysis

· Summarize the strengths and weaknesses of the built-in security of each of the 3 major OS categories (UNIX, open source, and Windows).

· Discuss how the weaknesses can be strengthened using the tools identified in the Security Tool Analysis section.

New Content: Secure Communications

Communications Summary

· Summarize each of the major types of computer communications used by the organization's systems.

· These communications should include computer-to-computer communications and user-to-computer communications.

· Provide a review of the potential security issues related to the internal and external communications.

· Discuss how company communications policies can play an important role in the reduction of communication security risks. Include specific examples and real-world case studies to support your discussion.

Tools and Techniques

· Identify and describe at least 3 tools or techniques that can be used to reduce the communications security threats for any of the OS categories (UNIX, open source, and Windows).

· For each tool or technology, specify a typical use case to demonstrate how the tool or technology can be used.
New Content: Virus Protection

Tools

· Describe the major systems in the organization that may be susceptible to virus threats.

· These systems should include all 3 operating systems categories (Unix, open source, and Windows) from the initial project requirements.

· For each system category, provide an analysis and recommendation of appropriate virus protection tools.

· Your analysis should include requirements and a comparison of features, cost, and any other relevant factors for at least 3 alternatives for each operating system; a final recommendation for an appropriate tool; and justification for your selection.

Policies

· Discuss how viruses, adware, spyware, and malware would impact your organization.

· Prepare at least 5 policies that will help reduce the threat of viruses, adware, spyware, and malware within the organization.

· The policies should include detailed steps to be followed.

· Provide details of how each policy will be effective in the reduction of these threats.

New Content:

Security Management

· Develop a security incident response policy for the organization.

· Provide an evaluation and recommendation for tools and processes to help analyze and track security threats and incident responses for all

3 operating systems categories (UNIX, open source, and Windows).

· Provide an evaluation and recommendation for forensics tools and policies to use in response to security incidents for all 3 operating systems categories (UNIX, open source, and Windows).

Security Cost/Benefit Analysis

· Provide a cost/benefit analysis for the tools and processes recommended throughout the Operating Systems Security Policies document versus the cost to the organization of security incidents.

· Add a long-term cost/benefit analysis that includes expected changes in the organization that might affect the costs and benefits of the recommended tools and processes.

Operating Systems Security Policies document, final draft

· Review the entire document for any changes and improvements that you would like to make.

· Ensure that this final version of the plan is sufficiently detailed to allow the organization to confidently move forward with the implementation of the operating system security plan based on your recommendations.

· Any previous instructor feedback should be addressed with appropriate changes.

Reference no: EM131148640

Questions Cloud

Describe how electric current is generated and transported : Describe how an electric current is generated and transported. Assess the current state of our national grid in the United States, as well as any challenges in updating this grid.
Identify a general plan to recover from the incident : Identify additional software that will be required to monitor the network and protect key assets. Identify any security controls that need to be implemented to assist in mitigating risks. Mitigate all of the risks that were identified during the asse..
Describe the differences between temperature and heat : Describe the differences and similarities between temperature and heat. Analyze how heat transfer occurs during the processes of conduction and convection. Provide an example of where each occurs in natural physical systems.
Prepare a corporate tax return for 2015 : ACC 404 Corporate Tax Return Project. Using the following information, prepare a corporate tax return for 2015. It is due on Monday, August 1, 2016. You may work on it in a group with up to two other students (maximum of 3 students per group)
How viruses - adware and spyware would impact organization : Provide a review of the potential security issues related to the internal and external communications. Discuss how company communications policies can play an important role in the reduction of communication security risks. Include specifi..
Indicate whether each statement is true or false : One reason managers use the full cost of products as the cost base in their pricing decisions is to promote price stability.- When there is price discrimination, pricing is not linked closely to the cost of the product.
Prepare the cash budget for iguana : Iguana, Inc., manufactures bamboo picture frames that sell for $30 each. - Compute the budgeted cash payments for Iguana.- Prepare the cash budget for Iguana.
Conduct external research from reputable and quality sources : Write a report on how relevant legislation, codes of practice, ethical principles, and national standards affect marketing operations - Briefly describe the following statistical methods and techniques to evaluate marketing opportunities, including..
Describe the importance of rare earth elements in science : Describe the importance of rare earth elements in science and technology. Assess the most common uses of these elements, particularly as encountered in your daily life, as well as projections for future demand of these minerals resources.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain the organizational and societal functions

Explain the organizational and societal functions of PR Identify an issue within that organizational that would have both organizational and societal implications.

  Internet security paperi have to write a 3-4 page paper

internet security paperi have to write a 3-4 page paper examining the impact that the internet has placed on

  Solve complex organisational problems theoretically

Solve complex organisational problems theoretically and practically and critically reflect on the effectiveness of management processes to real-world problems.

  Current architecture of internet and on any planned changes

Compare and contrast each architecture and How are they unique? What do they share? What factors drive your decision?

  Integration of e-commerce and erp system

ASSIGNMENT - Integration of E-commerce and ERP system with other ICT (information and communication technologies) to create value for customer and shareholders

  Converging technologiesnew and converging technologies have

converging technologiesnew and converging technologies have created an information age economy and altered the way

  Advantages and disadvantages of erp package

Advantages and disadvantages of ERP package and What are the advantages and disadvantages of ERP package or specific manufacturing production planning utilities?

  Technology role in healthcareyou are holding your first

technology role in healthcareyou are holding your first meeting with the office managers and the newest additions to

  Describe the overall manner in which ial uses

Discuss the significant attributes of a wiki, and describe the overall manner in which IAL uses wikis for its internal collaboration

  Explain the process within public key systems

Role of Technology, etc. and Explain the process within public key systems if you want to support non-repudiation and securing the message.

  What is denormalization

Explain how attributes are transformed into columns. What column properties do you take into account when making the transformations? The attributes become the columns of the relation and the identifier of the entity becomes the primary key of the r..

  Strategic planning helpcomplete the strategic toolkit as it

strategic planning helpcomplete the strategic toolkit as it relate specifically to strategy implementation of the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd