How viruses spyware and malware would impact organization

Assignment Help Computer Engineering
Reference no: EM131889025

Assignment

One of the most important aspects of operating systems security is protection from the ever-present and expanding threat of viruses. Viruses represent a significant threat to the valuable information and system resources in every organization, and proactive measures must be taken to provide adequate protection before damage is done.

For this assignment, you will continue the development of the Operating Systems Security Policies document. New content will include an analysis and recommendation of virus protection tools for each of the 3 OS categories (UNIX, open source, and Windows). You will also develop the policies that will help reduce the threat of viruses, adware, spyware, and malware entering the systems.

The following are the project deliverables:

• Update the Operating Systems Security Policies document title page with a new date and project name.
• Update the previously completed sections based on the instructor's feedback.
• New Content: Virus Protection

o Tools

- Describe the major systems in the organization that may be susceptible to virus threats.

- These systems should include all 3 operating systems categories (Unix, open source, and Windows) from the initial project requirements.

- For each system category, provide an analysis and recommendation of appropriate virus protection tools.

- Your analysis should include requirements and a comparison of features, cost, and any other relevant factors for at least 3 alternatives for each operating system; a final recommendation for an appropriate tool; and justification for your selection.

o Policies

- Discuss how viruses, adware, spyware, and malware would impact your organization.

- Prepare at least 5 policies that will help reduce the threat of viruses, adware, spyware, and malware within the organization.

- The policies should include detailed steps to be followed.

- Provide details of how each policy will be effective in the reduction of these threats.

Reference no: EM131889025

Questions Cloud

Describe a real-life scenario where selected tool enhance : Describe a real-life scenario where the selected tool would enhance communications security, and discuss the value of this protection to the company.
Overshoot the end point of neutralization : What could happen in the acetylation of ferrocene if you overshoot the end point of neutralization?
Why are they both reactive : What is most reactive, Ba or Fe? why are they both reactive? and why one is more reactive than the other?
Why does reactivity increase or decrease down a group : State and explain the trend in reactivity for the alkali metals. Why does reactivity increase or decrease down a group?
How viruses spyware and malware would impact organization : Discuss how viruses, adware, spyware, and malware would impact your organization. Describe the major systems in the organization that may be susceptible.
Calculate the concentration of mercury : a. Draw the flowchart for this system. b. Calculate the concentration of mercury in the downstream river.
Critical and AI focused reflection paper on your experiences : Get their feedback on how you did with your interactions, processes, Then compose a critical and AI focused reflection paper on your experiences
Estimate the molar mass of protein : Exactly 375.0 mg of an unknown protein is dissolved in enough water to give 50.00 mL of solution, and the osmotic pressure was determined
What caught your attention and why : Explain the personal importance of what you have learned. How has your view of yourself or society changed? How might you use your new knowledge?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd