INFT 5033 - Operating Systems and Application Security

Assignment Help Other Subject
Reference no: EM132502804 , Length: word count:2500

INFT 5033 - Operating Systems and Application Security Assignment - University of South Australia

Assessment Title - Operating Systems and Application Security Hardening

In this assessment, students will be required to design and implement a corporate identity and access management solution. This is a practical assessment, you will need to conduct research to determine the requirements and controls and fully implement your findings using virtual machines. It is an individual assessment which will be submitted in the form of a report.

The first task will commence with determining the security requirements for this environment. Consideration should be given to both the security requirements of the environment itself (e.g. ensuring confidentiality, integrity and availability of the identity/access data itself) and the security implications that the identity and access management system will have on other corporate systems (e.g. ensuring it has the flexibility to support a variety of security best practices for other systems which use it as an identity / access control source). Students should refer to one or more cyber-security frameworks (e.g. the Australian Signals Directorate Strategies to Mitigate Cybersecurity Incidents, or the NIST Cybersecurity Framework) when making recommendations in their report.

Once the security requirements have been considered, students must detail the specific security hardening controls that they will implement in a virtual machine environment to address these requirements. It would be expected that the noted security hardening requirements will have associated controls implemented in the virtual machine environment. N.B. This assessment should be considered from the perspective of a real-world organisation. As such, the fact that this is a case study environment is not grounds for non-implementation of security controls. Additional specification of the target environment is outlined in the Assessment Scenario section of this document.

The second major task will be to comprehensively document the security control implementation in a virtual machine environment which consists of at least one management server, one internal (managed) Windows client, one internal (managed) Linux client and one BYOD (unmanaged) device. A minimum of two case study services must be implemented and integrated with the identity and access management solution, a file server (demonstrated on all client devices) and user logon (demonstrated on the managed client devices). Additional case study services may also be implemented.

Additional virtual machine s may be required to fully explore and demonstrate the implemented security functionality. The documentation of this process should start from the installation of the guest operating system s and conclude with a fully operational and secure corporate environment. Although all stages of the implementation should be documented, the focus of the implementation documentation should be on security controls.

In summary, this report consists of two major sections (in addition to an executive summary, introduction, conclusion and reference list):

1. Investigation (in concert with one or more suitable cybersecurity frameworks) and design of a secure corporate identity and access management solution. This should be followed by an indication and discussion of the specific controls that will be implemented in Section 2, including justifying why they are important, and if any controls will not be implemented, justifying their exclusion.

2. Practical implementation of the environment using virtual machines. This section is to be documented via the use of annotated screenshots. Please ensure that the screenshots are comprehensive as the virtual machines will not be submitted as part of this assessment. While all sections of the implementation need to be documented, additional focus (screenshots) should be made on sections of the implementation that relate to Operating System and Application security (in contrast to general set up).

The word limit for this assessment is 2,500 words, however the implementation screenshots and their associated (brief) annotations do not count towards the word limit.

Attachment:- Operating Systems and Application Security Assignment File.rar

Reference no: EM132502804

Questions Cloud

Compute the net cash inflow : Compute the net cash inflow (incremental contribution margin minus incremental fixed expenses) anticipated from sale of the device for each year
What were the warranty expenditures : Warranty expense is based on 3% of sales, which were $43 million for the year. What were the warranty expenditures for 2018
Prepare pension worksheet based on the ASPE approach : Prepare pension worksheet for 2017 based on the ASPE approach. Show the journal entries for pension expense and contribution for 2017
Shift demand in the indicated market : Indicate how you think each of the following would shift demand in the indicated market. Explain your answer.
INFT 5033 - Operating Systems and Application Security : INFT 5033 - Operating Systems and Application Security Assignment Help and Solution - University of South Australia - Operating Systems and Application Security
How much economic surplus would you receive : How much economic surplus would you receive from washing it?
Give a proof of the converse direction : Give a careful proof of the converse direction. That is, prove that if M is maximal. then R/M is simple.
What are economic profits : What are economic profits? Does a firm in a perfectly competitive industry earn long-run economic profits? Explain.
Maximizing position of a perfectly competitive firm : Describe the profit maximizing position of a perfectly competitive firm in the long-run. Use a diagram to motivate your answer

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd