Identify the systems in the organization

Assignment Help Computer Engineering
Reference no: EM131860847

Assignment

Project Selection

The first step will be to select an organization as the target for your Operating Systems Security Policies document. This organization will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines:

• Nontrivial: The selected organization should be large enough to allow reasonable exercise of the operating systems security analysis process.

• Domain knowledge: You should be familiar enough with the organization to allow focus on the project tasks without significant time required for domain education.

• Accessibility: You should have good access to the people and other information related to the organization because this will be an important part of the process.

• Note: The selected organization may already have operating systems security policies in place and may still be used as the basis for the projects in this course.

• Note: The selected organization must have a need for some type of operating systems security as part of its operations. Therefore, you may feel free to identify a hypothetical organization that meets the requirements. Any necessary assumptions may be made by you to fulfill the requirements of organization selection.

Select an existing organization or identify a hypothetical organization that fits these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first several days of the course. Your instructor will tell you how to submit this proposal and what notification will be given for project approval.

Assignment

For the assignments in this course, you will not be implementing an operating systems security policy; rather, you will be developing a comprehensive operating systems security policies document. Your first task in this process will be to select an organization or identify a hypothetical organization to use as the basis of your projects. You will also create the shell document for the final project deliverable that you will be working on during each unit. As you proceed through each project phase, you will add contents to each section of the final document to gradually complete the final project delivery. Appropriate research should be conducted to support the development of your document, and assumptions may be made when necessary.

The following are the project deliverables:

• Submit the organization proposal to your instructor for approval.

• Operating Systems Security Policies document shell

o Use MS Word
o Title Page

- Course number and name
- Project name
- Student name
- Date

o Table of Contents

- Use autogenerated TOC
- Separate page
- Maximum of 3 levels deep
- Be sure to update fields of TOC so it is up-to-date before submitting project

o Section Headings (Create each heading on a new page with TBD as the content except for the sections listed under New Content below.)

- Project Outline
- Operating System Security Tools
- Security Threat Detection
- Secure Communications
- Virus Protection
- Security Management

o New Content

- Project Outline and Requirements

- Give a brief description of the organization (can be hypothetical) where the operating systems security policies will be implemented. Include company size, location(s), and other pertinent information.

- Identify the systems in the organization (i.e., the type and number of computer systems and operating systems used, along with a top-level view of the infrastructure). A network diagram would be useful for this purpose, but the diagram should be pasted into your Word document.

- Your project must assume that the organization has UNIX, open source, and Windows operating systems in its computing environment, so be sure to include all 3 categories in the systems overview.

- Identify and describe any outside connections to the internal systems.

- Summarize the benefits the company would realize through the implementation of operating systems security policies.

- Material can be taken from the approved proposal submitted to the instructor.

- Be sure that this project is approved by the instructor.

- Operating System Security Tools

- Based on the systems overview, identify and describe at least 3 security tools for each OS category (UNIX, open source, and Windows) that can be used at the operating system level to protect the systems, users, and data from security threats.

- The tools can be part of the OS or third-party tools. Some examples would include firewalls, account management, and port access management.

Reference no: EM131860847

Questions Cloud

Goal of assimilating indians into white society : Did the federal government accomplish its goal of assimilating Indians into white society? Why or why not?
Discuss how the security flaw is manifested : Your selection can be for any of the operating systems. Describe the security flaw, and discuss how the security flaw is manifested.
How you believe targets former ceo leader handled the crisis : Target officials announced that 40 million of Target customers had their credit and debit card information stolen as a result of computer hackers.
Story of the wizard of oz : Based on Foner's comments in the chapter, how does the story of the Wizard of Oz help to explain what was going on in the US at the turn of the 20th century?
Identify the systems in the organization : Identify the systems in the organization (i.e., the type and number of computer systems and operating systems use, along with top-level view of infrastructure).
Democracy for someone who works fulltime : From GIVE ME LIBERTY, BY Eric Foner, Seagull volume 2. According to John Mitchell in the excerpt from 1910 on page 711 (page 699 in Fourth
Summarize the benefits of story telling as healing practice : Reflecting on Theresa and Sarah's Story, Have you ever held an assumptive belief about a particular group in society? Elaborate on your answer.
Radical republicans during reconstruction : Over the course of U.S. history, many groups have tried to reshape U.S. society and politics in accordance with a vision they see as the promise of America
Explain how your genetic algorithm works : CS 534 Assignment: Search. Explain how your genetic algorithm works. You must describe your selection, crossover, elitism, culling, and mutation approaches

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a program that prompts the users to pick

A theater seating chart is implemented as a two-dimensional array of ticket prices like presented below. Write a program that prompts the users to pick either a seat or a price.

  What was the role of computers in that nobel prize

The 2013 Nobel Prize in Chemistry was in some sense a Nobel Prize given for work in computer science. What was the role of computers in that Nobel Prize?

  Explain protocol and network switching device

An area along the north wall of the coffee house has been set aside for the five computer stations, and since this is a very popular local hangout, it is expected that the computers, as well as wireless connections, would be in constant use. She i..

  Write down the normalized entities in the correct format

Write down the normalized entities in the correct format.

  Topological sorting method in c programming

how to prove the partial order R is a total order in discrete mathmetics and structures by topological sorting method in c programming

  Identify and explore contemporary challenge and opportunity

Demonstrate ability to collaborate with peers to analyse and solve business problems with information technologies, and present the solution in a report.

  What is the largest number of nand operators required

Express each of the different Boolean expressions in three variables in disjunctive normal form with just the NAND operator.

  Explain what is a reflective cross-site scripting attack

What is a cross-site scripting attack? Explain in your own words. What is a reflective cross-site scripting attack? Which Web application attack is more likely to extract privacy data elements out of a database?

  Find the deciphering map and then decipher the message

MA3626 - Find the number of possible encryption exponents and Find the deciphering map and then decipher the message - Find the largest possible value

  Write a report about different characteristics of scale type

Write a short report about different characteristics of scale types.

  Prepare a general set of instructions

Prepare a general set of instructions that will allow us to change any displayed value (from 0 to 9) to any desired value (from 0 to 9) in the least number of steps.

  Determining the project schedule

Discuss in scholarly detail how you determine a project schedule once the critical path has been identified and how to adjust the schedule if the calculated project.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd