Identify the operating system

Assignment Help Operating System
Reference no: EM131509999

Discussion deals with Operating systems and its vulnerabilities. An operating system is defined as the following: A software that manages the hardware and software of a system.

It also provides the User Interface that allows humans to interact with the system. As much of the information is either created and/or stored in the system, securing the OS requires a thorough understanding of the Operating system and how to secure it. There are many different types of operating systems that exist, either for desktops, routers, switches, servers, and mobile devices.

In the previous week's discussion, you identified and discussed a system and its vulnerabilities.

Based on the definition above, please identify the operating system. Provide recommendations on how you would secure and harden the operating system to ensure it has been configured more securely.

Based on the system and its operating system, please research the vendor and its website to identify any hardening guides and documents you may find. You may also research other sources on the Internet for a hardening guide.

Some of useful sites you may visit are the following:
SANS Information Security - SANS is a valuable information Security resource.

SANS organization has been recognized within the Information Security community as an indispensable tool for all security needs.

The reading room serves as the repository on thousands of white papers and documents regarding information security.

It has templates on creating InfoSec policies and guidelines on how to configure IT systems securely.

Best Practices and How To Articles - Here is a collection of Information Security policy documents, best practices, and how to articles for Information Security. It can be used to help develop hardening documents.

National Vulnerability Database Repository - National Institute of Standards and Technology is a government agency that is tasked with developing standards on all technology, from IT to non-IT technology and things like standard weights and measure. Many regulations that drive Information Security reference NIST as a source for standard methodologies used in the industry.

Based on your research, please list and discuss any operating system configuration that needs to be evaluated and hardened. Please identify the default setting and what it needs to be to ensure a higher level of security. You should also indicate the importance of the setting.

Reference no: EM131509999

Questions Cloud

Consider the chemistry of water or h2o : In particular, we will consider the chemistry of water or H2O; each water molecule has 2 hydrogen atoms and 1 oxygen atom.
Discuss social marketing campaigns : Choose a social marketing campaign that is working to bring awareness regarding a health condition or problem.
Interesting development in the arctic : As the climate continues to warm, there will be interesting development in the Arctic as the ice melts. Nations including Russia, Canada, USA and China.
Discuss the techniques available for fingerprinting : Discuss the techniques available for fingerprinting the deceased and various reasons why the deceased's standards are taken
Identify the operating system : An operating system is defined as the following: A software that manages the hardware and software of a system.
Define the social media plan : Instructions: For this assignment you will be creating a social media plan to inform the public about a current health problem.
Concerned about its availability in the future : If water is one of our most abundant resources, why are we concerned about its availability in the future?
Producing energy from biomass : What are some of the problems associated with producing energy from biomass?
Rapid transition from coal to natural gas : What environmental and economic problems could result from a rapid transition from coal to natural gas?

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd