How viruses spyware and malware would impact organization

Assignment Help Computer Engineering
Reference no: EM131889025

Assignment

One of the most important aspects of operating systems security is protection from the ever-present and expanding threat of viruses. Viruses represent a significant threat to the valuable information and system resources in every organization, and proactive measures must be taken to provide adequate protection before damage is done.

For this assignment, you will continue the development of the Operating Systems Security Policies document. New content will include an analysis and recommendation of virus protection tools for each of the 3 OS categories (UNIX, open source, and Windows). You will also develop the policies that will help reduce the threat of viruses, adware, spyware, and malware entering the systems.

The following are the project deliverables:

• Update the Operating Systems Security Policies document title page with a new date and project name.
• Update the previously completed sections based on the instructor's feedback.
• New Content: Virus Protection

o Tools

- Describe the major systems in the organization that may be susceptible to virus threats.

- These systems should include all 3 operating systems categories (Unix, open source, and Windows) from the initial project requirements.

- For each system category, provide an analysis and recommendation of appropriate virus protection tools.

- Your analysis should include requirements and a comparison of features, cost, and any other relevant factors for at least 3 alternatives for each operating system; a final recommendation for an appropriate tool; and justification for your selection.

o Policies

- Discuss how viruses, adware, spyware, and malware would impact your organization.

- Prepare at least 5 policies that will help reduce the threat of viruses, adware, spyware, and malware within the organization.

- The policies should include detailed steps to be followed.

- Provide details of how each policy will be effective in the reduction of these threats.

Reference no: EM131889025

Questions Cloud

Describe a real-life scenario where selected tool enhance : Describe a real-life scenario where the selected tool would enhance communications security, and discuss the value of this protection to the company.
Overshoot the end point of neutralization : What could happen in the acetylation of ferrocene if you overshoot the end point of neutralization?
Why are they both reactive : What is most reactive, Ba or Fe? why are they both reactive? and why one is more reactive than the other?
Why does reactivity increase or decrease down a group : State and explain the trend in reactivity for the alkali metals. Why does reactivity increase or decrease down a group?
How viruses spyware and malware would impact organization : Discuss how viruses, adware, spyware, and malware would impact your organization. Describe the major systems in the organization that may be susceptible.
Calculate the concentration of mercury : a. Draw the flowchart for this system. b. Calculate the concentration of mercury in the downstream river.
Critical and AI focused reflection paper on your experiences : Get their feedback on how you did with your interactions, processes, Then compose a critical and AI focused reflection paper on your experiences
Estimate the molar mass of protein : Exactly 375.0 mg of an unknown protein is dissolved in enough water to give 50.00 mL of solution, and the osmotic pressure was determined
What caught your attention and why : Explain the personal importance of what you have learned. How has your view of yourself or society changed? How might you use your new knowledge?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write your sdlc process for you topic

Using Slide 7 from the Chapter 9 power point write your SDLC process for you topic. You will submit the project be a minimum of 8 power point slides

  Why does the create components method of filled frame call

Why does the create Components method of Filled Frame call add(panel), whereas the main method of Filled Frame Viewer calls frame.add(panel)?

  Develop the logic for a program that accepts a players name

Develop the logic for a program that accepts a player's name, age and nine-hole score as input. Display the player's name and score on each of the nine holes.

  Should pharmacies make available to the public

Does the Ministry of Health have a moral responsibility to educate the population about the risks involving the use of generic drugs Should pharmacies make available to the public the list of CDAP drugs which are generic

  Discuss the cpm marketplace over the last couple of years

What are some of the major acquisitions that have occurred in the CPM marketplace over the last couple of years

  The module review questions listed below these questions

1.answer the module review questions listed below. these questions were chosen to demonstrate your understanding and

  Describe why each site you used is credible and accurate

why each site you used is credible and accurate. NOTE: If you aren't sure how to do this, read the Learn content for guidance or discuss with your instructor.

  How would the program behave differently

The Dots program listens for a mouse pressed event to draw a dot. How would the program behave differently if it listened for a mouse released event instead?

  Which biometric authentication methods is frequently found

Which of the following biometric authentication methods is most frequently found on laptops? Which of the following lock grades should be selected in order to appropriately protect critical business assets?

  What is difference between size and the capacity of vector

What is the difference between the size and the capacity of a vector? Why do we have a constructor that lets us set the initial capacity?

  Describe how to implement the heap-sort algorithm

Describe how to implement the heap-sort algorithm using, at most, six integer variables in addition to an input array itself.

  Write a program to break a number into its individual digits

Write a program to break a number into its individual digits, for example to turn 1729 into 1, 7, 2 and 9. It is easy to get last digit of a number n as n % 10.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd