Discuss the total threat coverage for the operating systems

Assignment Help Operating System
Reference no: EM132387645

Assignment: Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Conduct research using the library and Internet for information about tools for operating system security threat detection.

• Based on your research, select 1 of the tools that you found, and describe how the tool provides information that is useful in the detection of potential and actual security breaches.

• Provide at least 1 example of how the information would be used in a real-life scenario.

Project ( 3-4 ) pages of content:

One of the first tasks in the development of operating system security policies is to identify the tools that can be used for the detection and prevention of security threats to the organization's operating systems. The operating systems form the core of the system operations, and security violations at the operating system-level could compromise every aspect of the system's and organization's IT resources.

For this assignment, you will conduct an analysis and selection of tools that would be appropriate for the detection of operating system security threats in the organization's systems. You will also summarize the strengths and weaknesses of the built-in security of each of the 3 OS categories (UNIX, open source, and Windows) so that you will be able to determine which areas may need additional security support from other tools.

The following are the project deliverables:

1. Update the Operating Systems Security Policies document title page with a new date and project name.

2. Update the previously completed sections based on the instructor's feedback.

3. New Content: Security Threat Detection

a. Security Tool Analysis

• Review and identify at least 3 tools that would be effectively used in the detection and prevention of operating system security threats in the organization's systems.

• Include the types of threats that the tools identify.

• Discuss the total threat coverage for the operating systems provided by these tools.

• Given that implementation of security tools requires significant investment, management will likely be reluctant to approve them unless the investment can be justified. As part of your analysis, describe why these tools are necessary for the company and how the investment can be justified to management.

b. Built-in Security Analysis

• Summarize the strengths and weaknesses of the built-in security of each of the 3 major OS categories (UNIX, open source, and Windows).

• Discuss how the weaknesses can be strengthened using the tools identified in the Security Tool Analysis section.

4. Be sure to update your table of contents before submission.

Reference no: EM132387645

Questions Cloud

Discuss the future of information delivery : discuss the future of information delivery.
What role it innovation play in a company strategic plan : In 175 words or more discuss what role IT innovation should play in a company's strategic plan, and why? Should a company plan to do something it has never.
What three types of buying situations : Describe a strategy or tactic the salesperson might employ for one of the situations.
Identifying an organization resources : According to Robert M. Grant, in his book Foundations of Strategy, what is the importance of identifying an organization's Resources and Capabilities?
Discuss the total threat coverage for the operating systems : Discuss the total threat coverage for the operating systems provided by these tools. Given that implementation of security tools requires significant investment
Contingent selection and give personal : Compare/Contrast initial/substantive, and contingent selection and give personal examples of how each of these should be used in the external selection
Which you would have benefitted from mentoring : Think about a situation in which you would have benefitted from mentoring
Tedtalk of regina hartley on the selection process : Considering the TedTalk of Regina Hartley on the selection process:
Describe organizational agility : Describe organizational agility. What 2 organizational characteristics contribute the degree of an organization's agility?

Reviews

Write a Review

Operating System Questions & Answers

  Implement a separate memory component

Generate 10,000 requests using the request generation component, and for each request, invoke the appropriate function of the Memory component for each of the memory allocation/deallocation techniques.

  Information-level design for college requirements

Database at college is needed to support following requirements. Complete information-level design for this set of requirements. Use your own experience to find out any constraints you require which are not stated in problem

  Explain the role of determining the speed of a computer

§ Convenience and quality of output are important. Explain what method of output would be best for each of the following situations and explain why

  When would we overwrite bob''s database, and with what

Suppose we are using Lamport's hash, and Bob's system crashes before receiving Alice's reply to a message. Further suppose an intruder, Trudy, can eavesdrop and detect that Bob crashed (maybe Trudy can even cause Bob to crash).

  Describing the gnu public license and its role

Write a 1- to 2-page paper defining and describing the GNU public license and its role and Write a 1- to 2-page paper defining and comparing open source and closed source operating systems. Provide examples of each

  Unix and linux comparison matrix

UNIX and Linux Comparison Matrix, Choose three different versions of the UNIX or Linux operating systems to compare. Insert the three chosen versions and fill out the requested information in the Components column.

  Find the sizes of the tag, block and word fields

Assume that a computer using direct mapped cache has 2^24 words of main memory and a cache of sixty-four blocks, where each cache block contains sixteen words.

  Subject of embedded operating systems

Review an article about the subject of embedded operating systems or embedded systems that appeared in a recent computing magazine or academic journal.

  describe how you would do so with a positive feedback loop.

Describe how you would use a negative feedback loop to manage your bank balance.Describe how you would do so with a positive feedback loop. Explain which you would prefer and why?

  Design an improved interactive password system

Design an improved interactive password system? Present your design and describe what kind of attacks your protocol can protect.

  Share your thoughts on transitioning to an EHR

Discuss the findings of the article and share your thoughts on transitioning to an EHR. Post your findings in a Word document

  A machine has a 32-bit address space and an 4-kb page

A machine has a 32-bit address space and an 4-KB page. Suppose a simple OS just boot up on the machine, running a single process. The process uses 2 memory pages for the text and data memory (combined) near the lowest virtual address, and 1 memory pa..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd