Discuss about the security considerations

Assignment Help Computer Engineering
Reference no: EM132069655

Question: Primary Task Response

Your first task is to post your own Key Assignment outline to the discussion area so that other students are able to review your plan. Attach your document to the main discussion post, and include any notes that you feel are appropriate. The purpose of this assignment is to help improve the quality of the Key Assignment draft that you will complete next week.

Key Assignment Draft

As is true with all components in any computing environment, security considerations are paramount for operating systems as well. Performing risk assessments and identifying mitigation strategies in advance is a way to ensure that security has been addressed at the operating system level. Virtualized operating systems bring a new set of challenges.

Assignment: For this assignment, you will be compiling your draft of your Key Assignment by incorporating all of the feedback you have received from your instructor and classmates in this week's Discussion Board. You will also be adding new content related to identifying security risks and potential mitigation strategies.

The project deliverables are the following:

1. Update the Operating Systems Design Document title page with the new date and project name.

2. Update the previously completed sections based on instructor feedback.

3. New content (2-3 pages) regarding security should include the following:

• A description of the areas of an operating system that should be evaluated for performing a risk assessment

• A thorough description of at least 5 risks that pertain to your selected operating system solution

• A description of the risk mitigation approach for each risk

Reference no: EM132069655

Questions Cloud

Data science major assignment : You are required to present your research in the final week of semester. You will be assigned a time and all group members must attend and present.
What is the entry for the dividend declaration : The board of directors of Capstone Inc. declared a $.40 per share cash dividend on its $1 par common stock. What is the entry for the dividend declaration
Certainty equivalent of the real estate investment : What do you know about the certainty equivalent (for the couple) of the real estate investment?
What are the important elements to running the organization : Larger organizations need more clerical and administrative staff to keep the organization running smoothly.
Discuss about the security considerations : As is true with all components in any computing environment, security considerations are paramount for operating systems as well. Performing risk assessments.
Prepare the journal entry relating to the machine : Irwin decided to change to the straight-line method. Ignoring income taxes, prepare the journal entry relating to the machine for 2016
Market imperfections was there arbitrage opportunity : If there are no market imperfections, was there an arbitrage opportunity here? If so, how would you have exploited it?
What is the net income for the year : Common stock increased by $194 and retained earnings decreased by $120. What is the net income for the year?
Company from a strategic point of view : Write a comment using the concept learnt during the MBA strategic management course and say if you agree with the decision.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd