Create digital files by employing a template

Assignment Help Operating System
Reference no: EM131909095

Operating Systems Course Project

Overview: During the Hands-On Lab, you focused on operating system (OS) security fundamentals. In fact, throughout a few of the labs you have implemented some key security features - user authentication, user and group management, resource sharing, permissions, etc. This is important because security needs to be built in to several areas of an OS instead of being viewed as an afterthought. In this module's course project assignment, you will begin developing a Security Policy for SOHO Inc. A Security Policy for an organization combines several different elements into one master document, which is the Security Policy. One of these sub-policies is a Software Installation Policy, which defines the requirements around installation of third party software on company owned devices. Develop a Software Installation Policy that includes the built-in tools to control software installation on Windows 10, a popular Linux distribution, and Mac OS X 10.x systems. You are not creating an individual policy for each OS; rather, you will create a single policy that includes the tools for each OS (e.g. Windows 10 - local security policy, Linux - SELinux, etc.). This plan will also include a patch management plan for OS/software updates. As a reminder, SOHO Inc. has the following requirements as it relates to their security needs:

  • At this time, built-in security mechanisms are sufficient for data, end-user, and desktop security.

Objectives:

The overall objective of this project is to develop a Software Installation Policy; however, you will also demonstrate the ability to:

  • Independently navigate to and open an Internet browser to use its interface to access simple Internet Technology.
  • Evaluate digital resources by relying on search engine results and distinguishing relevant digital materials from irrelevant materials.
  • Create digital files by employing a template to create a document in the proper file format that incorporates built-in software tools for integrating graphics and other enhancements.
  • Collaborate digitally using digital tools to enter contact information and directions to access specific websites to retrieve digital resources.
  • Select credible sources and cite them according to APA standards.

Resources: Utilize the Windows Snip tool to capture the requested screenshots and insert those screenshots where indicated. If you need assistance with using the Snip tool, please refer to this tutorial.

Software Installation Policy: Utilize the Rich Text field below to define the Software Installation Policy that includes the tools for each OS (e.g. Windows 10 - local security policy, Linux - SELinux, etc.). This plan will also include a patch management plan for OS/software updates. In the field, you can incorporate section headers, font adjustments, screenshots, etc. If you use any source material, use in-text citations, per APA standards, and ensure the sources are included in References section at the end of this document.

References: Use this field to cite your credible reference sources per APA standards.

Reference no: EM131909095

Questions Cloud

What is the distinctive competence : What is the distinctive competence of the following companies? Explain how a distinctive competence in operations can be the basis for competition.
What are practical consequences of lack of strategic linkage : How has globalization affected its operations and its supply chain? What are the practical consequences of a lack of strategic linkage between the business.
How the process view of an organization uncover the need : In the following operations, isolate a system for analysis and define customers, services produced, suppliers, and the primary process flows.
Explain the differences between capacity and flow rate : Provide a definition of a bottleneck. Why is it important to find the bottleneck? Explain the differences between capacity, flow rate, and demand.
Create digital files by employing a template : CDA 1330C - Operating Systems Course Project. Create digital files by employing a template to create a document in the proper file format
When does mill say that individuality should assert itself : In your own words, explain Mill's position on the value of custom and tradition as guides for conduct? To what extent do you agree with him?
Deposit with no outstanding checks or uncleared deposits : You have $49,762 on deposit with no outstanding checks or uncleared deposits. What is your net float?
Post an explanation of what carters duty was : Definitions of moral obligation and the categorical imperative. Also consider how Kantians distinguish between right and wrong -
Describe service blueprinting in your own words : Provide a definition of a bottleneck. Describe service blueprinting in your own words, including examples of when it should be used.

Reviews

Write a Review

Operating System Questions & Answers

  Will the idea work if three or more processes use semaphore

In this way, programs that feel it is immoral to block can first inspect the semaphore to see if it is safe to do a down. Will this idea work if three or more processes use the semaphore? If two processes use the semaphore?

  What are the features that make them different

Why are there so many versions of OS? What are the features that make them different? Explain the pros and cons of each. How can the evolution of OS benefit an organization and cause harm to an organization?

  Wireless encryption standards

Compare the several wireless encryption standards. Determine the purpose of implementing wireless encryption and discuss the benefits of each standard?

  Implement a client-server application

It implements a client-server application in which 3 clients each send a single integer to the server through a FIFO - Determines the best fit for one of three fixed size memory partitions

  What are decoys and how are they used in a network

What are the pros and cons of passive and active intrusion detection?

  Create your own shell

The premise of Project 2 is to create your own shell. Your shell will be launchable from a terminal window and act similar to the existing shell.

  Why do you think that embedded systems are so popular

Why do you think that embedded systems are so popular? Is it because of how reliable they are? Are they also secure

  Provide security suggestions for laptop users

Andersen & Sons is a huge marketing company with four offices in the Chicago area. Each office has Windows Server 2003, and all servers are in a single domain.

  What happens when two jobs come with the same priority level

Operating Systems Discusion- What happens when two jobs come with the same priority level? Then first come first served is used.

  Currently the atm is idle

Currently the ATM is idle. Find the probabilities that, in 3 minutes, the ATM will be idle; will be serving one customer with no one in the queue; will be serving one customer with one customer waiting in the queue

  Assume that the passwords were eight characters

Assume that the passwords were eight characters long but that the salt length was increased to 24 bits. Again, the salts (and the corresponding algorithms) are known to all users. What would be the expected time to find all users' passwords using ..

  Mobile computing technology

Discuss similarities and differences of patient vital signs using mobile computing technology to in-patient visits to the doctor's office or hospital.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd