Survey of economic impact of operating system security

Assignment Help Computer Network Security
Reference no: EM13889550

Topics

Choose one topic

Economic aspects of operating system security mechanisms

Cyber security violations usually target networks, systems or apps. This course is obviously about systems or more specifically, operating systems. As discussed in class, different security mechanisms are incorporated into operating systems such as passwords, certificates, access controls, anti-virus etc. However, little research exists in the literature on the economics of installing these security or protection mechanisms. For instance, did you know that nearly 100% of "invalid certificate" warnings are false positives? While it is certainly not advisable to connect to web sites offering invalid or expired certificates, it is common experience that such warnings usually tend to be false alarms (e.g. the website perhaps just didn't renew their certificate to avoid fees). But from an economics standpoint, it is useless effort expended by users, continuously bothered by false alarms, obstructing their productivity.

Your job is to research on any five to ten such protection or security mechanisms offered by modern operating systems and then report on the economics of having those mechanisms:

Are they truly necessary?

How often do they emit false alarms (aka. false positives)?

Analyze the economics of the mechanism. i.e. cost-benefit ratio where the time/effort/money used to install and use those mechanisms requires is compared to the benefit they offer in terms of preventing attacks.

2. Survey of economic impact of operating system security violations

Survey and report on major data breaches or cyber security attacks where weaknesses of operating systems were exploited. Summarize about four or five of them and explain the economic impacts of those attacks. i.e., how much losses were incurred and how better protection mechanisms into the OS (either by the designers or by users) would have helped mitigate those losses. Provide full details.

Reference no: EM13889550

Questions Cloud

What are the issues of the time when the book was written : One to Two pages reflection paper on the James Cone "God of the Oppressed"- How James Cone see? -The Struggle of Black people. What are the issues of the time when the book was written
Identify wireless networking concepts : Identify Wireless Networking concepts
Give a short explanation of the title of the article : Having read the full article, give a short explanation of the title of the article, or why B. thinks that Christians cannot be "post-racial
Context of the definition of externalities : Is it a good idea for the government to require automobile manufacturers to include pollution control devices, and certain safety devices (i.e. air bags) in every car sold in the U.S.? Explain from the context of the definition of externalities.
Survey of economic impact of operating system security : Survey of economic impact of operating system security violations
Similarities or differences in ets and its affect : Carbon Tax/Emission Trading scheme – Compare Australia with one of these countries or group of countries like Europe,USA and China/India and discuss the similarities or differences in ETS and its affect on the economy
What are the current issues of retailers and merchants : Definition and origin of Omni-channel retailing: What is Omni-channel retailing? Current issues in Omni-channel retailing: What are the current issues of retailers and merchants
Create a constant to hold the desired duration of workout : Creates an instance of the FiFiWorkout.java class. Gets input for first name. Create a constant to hold the desired duration of workout. Set it to 30.
Identify a diversity situation or cultural dilemma : Identify a diversity situation or cultural dilemma that is prevalent in today's society. a.Provide an analysis of the topic, including historical perspective and current day situation.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Gamal signature schemes

Prove that the equation yaab mod p = gm mod p holds for the signature values chosen by Equation 1, 2 and 3].

  Encryption and decryption of the vigenere cipher

Implement both encryption AND decryption of the Vigenere cipher with 26 English letters and 1 space character "_" in its tableau as shown in class.

  What is the purpose of the diffie-hellman algorithm

Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.

  Explain the concepts of information systems security

Explain the concepts of information systems security as applied to an IT infrastructure and describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

  Does the resulting scheme satisfy perfect secrecy

Consider the one time pad encryption scheme to encrypt a 1-bit message m with a 1-bit key k. Replace the XOR operation with another operation X. For which X(m,k) does the resulting scheme satisfy perfect secrecy?

  Fundamental security properties

List the three fundamental security properties and for each give an example of failure. Justify your answer based on literature and Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and pag..

  Network security policy plan

Explain why you believe these are important, and include examples of security breaches that can occur if these items are not outlined and followed.

  Compare and contrast the security user interface

Compare and contrast the security, user interface, and performance features of Windows 7 and Windows 8. From an organizational standpoint, support or challenge the decision to upgrade from Windows 7 to Windows 8 based on the available features. J..

  Information security

A computer forensics investigator needs to develop an understanding about security standards and formal procedures within an organisation. This module will provide knowledge in addressing issues around security in the organisational environment. T..

  Campus ip addressing redesign understand the spread sheet

understand the spread sheet and redesign the present ipv4 network design and the attatchments gives the detailed

  Project management to suppress the dissemination

The general method is to encourage timely communication of news to project stakeholders. However, can you envisage conditions where it may be necessary,

  Role of information security

Role of Information Security.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd