Discuss the total threat coverage for the operating systems

Assignment Help Operating System
Reference no: EM131886086

Assignment

One of the first tasks in the development of operating system security policies is to identify the tools that can be used for the detection and prevention of security threats to the organization's operating systems. The operating systems form the core of the system operations, and security violations at the operating system-level could compromise every aspect of the system's and organization's IT resources.

For this assignment, you will conduct an analysis and selection of tools that would be appropriate for the detection of operating system security threats in the organization's systems. You will also summarize the strengths and weaknesses of the built-in security of each of the 3 OS categories (UNIX, open source, and Windows) so that you will be able to determine which areas may need additional security support from other tools.

The following are the project deliverables:

• Update the Operating Systems Security Policies document title page with a new date and project name.
• Update the previously completed sections based on the instructor's feedback.
• New Content: Security Threat Detection

o Security Tool Analysis

- Review and identify at least 3 tools that would be effectively used in the detection and prevention of operating system security threats in the organization's systems.

- Include the types of threats that the tools identify.

- Discuss the total threat coverage for the operating systems provided by these tools.

- Given that implementation of security tools requires significant investment, management will likely be reluctant to approve them unless the investment can be justified. As part of your analysis, describe why these tools are necessary for the company and how the investment can be justified to management.

o Built-in Security Analysis

- Summarize the strengths and weaknesses of the built-in security of each of the 3 major OS categories (UNIX, open source, and Windows).

- Discuss how the weaknesses can be strengthened using the tools identified in the Security Tool Analysis section.

• Be sure to update your table of contents before submission.

Attachment:- Natasha-Manning-Redmond.rar

Reference no: EM131886086

Questions Cloud

Demonstrate your understanding of crime prevention : Demonstrate your understanding of crime prevention programs and the role crime prevention plays in the overall criminal justice system.
Describe the key elements of construction practice : Describe the key elements of construction practice? How can process patterns assist a development team build software products efficiently?
How competencies and knowledge support career advancement : What competencies were you able to develop in researching and writing the Comprehensive Project due in Unit 5? How will these competencies and knowledge.
Discuss how the organization uses volunteers : What other partnerships (companies, businesses, organizations, universities, etc.) does the organization have? What are the benefits of these partnerships?
Discuss the total threat coverage for the operating systems : Discuss the total threat coverage for the operating systems provided by these tools. Update the previously completed sections based on the instructors feedback.
The main criticisms of community policing in ferguson : What steps can communities take to make community policing a successful strategy for law enforcement?
Develop an attack plan that covers the given criteria : Develop an attack plan that covers these criteria. Find tools on the web that could help you find information about systems/networks, etc.
Describe the challenges you would face in policing : As stated in your text there are about 566 federally recognized tribal governments within the United States.
What is the purpose of nonroutable protocols : In your opinion, what is the purpose of nonroutable protocols? Is there a legitimate reason for having nonroutable protocols?

Reviews

Write a Review

Operating System Questions & Answers

  Compare video, voice, and data formats.

Compare video, voice, and data formats. Identify at least three bandwidth techniques and how you would manage them with either UDP or TCP protocols

  Compare and contrast closed-source mobile operating systems

Compare and contrast open-source and closed-source mobile operating systems (OSs), and explain the main reasons why you would consider utilizing one (1) of these types of OSs over the other. Provide at least two (2) reasons to justify your decisio..

  Explain whether the erp software is mostly appropriate for

originally the sap erp software was developed for and implemented by mostly manufacturing companies in the beginning.

  What is the maximum data transfer rate

What is the storage capacity of the disk? What is the maximum data transfer rate (bytes/second)? What is the maximum rotational delay? What is the transfer time?

  Frequency definition of bandwidth

In data communication we often use term "bandwidth" when we refer to capacity of a link. Strictly speaking, however, bandwidth refers to range of frequencies that can be carried on a link.

  Describe lean operating systems

Lean Operating Systems, From the first e-Activity, examine at least three different types of waste that can be found in an organization of your choice. Suggest the lean strategies to confront them.

  Operating system for a multimedia pc

Do you really think that the selection of Operating System makes a large difference when it comes to a specific purpose?

  Stateful inspection packet filtering routers

Name two benefits of Stateful Inspection Packet Filtering Routers. Name two benefits that firewalls add to a network

  What if four hexadecimal digits are used

What if four hexadecimal digits are used? Explain your answer.

  Question 1a an interrupt triggers a number of events both

question 1a an interrupt triggers a number of events both in processor hardware and in software. discuss about the

  Important information about windows operating system

Assume you have learned a great deal of important data about the Windows operating system so far. However, we have not even scratched the surface of the capabilities of Windows XP.

  Operating systems assign a process number

Operating systems assign a process number to every running application program. Can you explain why these process numbers cannot be used instead of port numbers

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd