Describe any outside connections to the internal systems

Assignment Help Computer Engineering
Reference no: EM132385328

Assignment: Project Selection

The first step will be to select an organization as the target for your Operating Systems Security Policies document. This organization will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines:

• Nontrivial: The selected organization should be large enough to allow reasonable exercise of the operating systems security analysis process.

• Domain knowledge: You should be familiar enough with the organization to allow focus on the project tasks without significant time required for domain education.

• Accessibility: You should have good access to the people and other information related to the organization because this will be an important part of the process.

• Note: The selected organization may already have operating systems security policies in place and may still be used as the basis for the projects in this course.

• Note: The selected organization must have a need for some type of operating systems security as part of its operations. Therefore, you may feel free to identify a hypothetical organization that meets the requirements. Any necessary assumptions may be made by you to fulfill the requirements of organization selection.

Select an existing organization or identify a hypothetical organization that fits these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first several days of the course. Your instructor will tell you how to submit this proposal and what notification will be given for project approval.

Assignment

For the assignments in this course, you will not be implementing an operating systems security policy; rather, you will be developing a comprehensive operating systems security policies document. Your first task in this process will be to select an organization or identify a hypothetical organization to use as the basis of your projects. You will also create the shell document for the final project deliverable that you will be working on during each unit. As you proceed through each project phase, you will add contents to each section of the final document to gradually complete the final project delivery. Appropriate research should be conducted to support the development of your document, and assumptions may be made when necessary.

The following are the project deliverables:

1. Submit the organization proposal to your instructor for approval.

2. Operating Systems Security Policies document shell

a. Use MS Word

b. Title Page

• Course number and name

• Project name

• Student name

• Date

c. Table of Contents

• Use autogenerated TOC

• Separate page

• Maximum of 3 levels deep

• Be sure to update fields of TOC so it is up-to-date before submitting project

d. Section Headings (Create each heading on a new page with TBD as the content except for the sections listed under New Content below.)

e. week 1 project

1. Project Outline and Requirements

• Give a brief description of the organization (can be hypothetical) where the operating systems security policies will be implemented. Include company size, location(s), and other pertinent information.

• Identify the systems in the organization (i.e., the type and number of computer systems and operating systems used, along with a top-level view of the infrastructure). A network diagram would be useful for this purpose, but the diagram should be pasted into your Word document.

• Your project must assume that the organization has UNIX, open source, and Windows operating systems in its computing environment, so be sure to include all 3 categories in the systems overview.

• Identify and describe any outside connections to the internal systems.

• Summarize the benefits the company would realize through the implementation of operating systems security policies.

• Material can be taken from the approved proposal submitted to the instructor.

• Be sure that this project is approved by the instructor.

2. Operating System Security Tools

• Based on the systems overview, identify and describe at least 3 security tools for each OS category (UNIX, open source, and Windows) that can be used at the operating system level to protect the systems, users, and data from security threats.

• The tools can be part of the OS or third-party tools. Some examples would include firewalls, account management, and port access management.

Reference no: EM132385328

Questions Cloud

Data forensics and cloud computing : Why institutions are reluctant to move their IT to the cloud. Consider specific industries like education, medicine, military, etc.
Responds to real-time information security anomalies-events : A security operations center (SOC) is dedicated monitoring, assessment, and defense facility that responds to real-time information security anomalies and event
Explain role and overall objectives of financial management : Explain the role and overall objectives of Financial Management. Secure and interpret financial data from various sources including financial exchanges
ACC60008 Accounting Systems and Reporting Assignment Problem : ACC60008 – Accounting Systems and Reporting Assignment Help and solutions- Swinburne University of Technology Australia
Describe any outside connections to the internal systems : Identify and describe any outside connections to the internal systems. Summarize the benefits the company would realize through the implementation of operating.
Why institutions are reluctant to move their it to the cloud : Why institutions are reluctant to move their IT to the cloud. Consider specific industries like education, medicine, military, etc.
How you will use the knowledge and skills to support goals : After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals
Create security policy that would benefit your organization : Create a security policy that would benefit your organization. Suggest an audit mechanism to determine complianceUse the following Format for your policy.
About security flaws in unix-windows operating systems : Conduct research using the library and Internet for information about security flaws in UNIX, open source, and Windows operating systems.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd