Security is an essential element in modern operating system

Assignment Help Operating System
Reference no: EM13836812

Security is an essential element in modern operating system design. An open and unprotected TCP/IP port can present a significant network operating system vulnerability. In the first portion of your post, you will investigate and describe the security status of your operating system. Using an available workstation, execute one of the following commands on your Windows, OS X, or Linux workstation to determine the status of its TCP ports.

Windows: netstat -np tcp
Linux: netstat -at
OS X: netsat -p tcp

In the second portion of your post, explain what you found based upon what your operating system reports. For the third and final portion of your post, perform an internet search to determine what elements of SANS 20 you could leverage to reduce the TCP/IP vulnerabilities of your workstation. Report your findings to the class.

Reference no: EM13836812

Questions Cloud

Diversity and equity schooling girls and women : Normal 0 false false false EN-US X-NONE X-NONE Diversity and Equity Schooli..
Prepare the journal entry to record depletion expense : Prepare the journal entry to record depletion expense. Assume that the 100,000 tons of ore were mined, but only 80,000 units were sold. How are the costs applicable to the 20,000 unsold units reported?
Provide a brief summary of the firms business activities : Provide a brief summary of the firm's business activities and business segments and recent developments in the company and its industry.
The new manager of a major clothing store : You are the new manager of a major clothing store that is fac-ing a crisis. This clothing store has been the leader in its market for the last 15 years. In the last three years, however, two other major cloth-ing store chains have opened, and they ha..
Security is an essential element in modern operating system : Security is an essential element in modern operating system design. An open and unprotected TCP/IP port can present a significant network operating system vulnerability
The effectiveness of any compensation system to attract : The effectiveness of any compensation system to attract, retain and align employee behavior and performance with the objectives of the enterprise is dependent upon management credibility. If you were advising a CEO on steps he or she could take to en..
Many business leaders led by blunt authority : In the past, many business leaders led by blunt authority, relying heavily on the power of their positions to motivate their employees. This authoritarian leadership style rarely produces top results in today's business climate. Instead, modern busin..
Discussion—sociological causes of crime : Discussion-Sociological Causes of Crime
What factors would need to consider : 1. If you were starting up a new business and making investment decisions in technology, how would you make the decision on using a thin client or a fat client approach for your employees?  What factors would you need to consider?

Reviews

Write a Review

Operating System Questions & Answers

  Question 1a four special cases and difficulties arise at

question 1a four special cases and difficulties arise at times when using graphical approach to solving lp problems.

  Explain how pipelining improves cpu efficiency

Explain how pipelining improves CPU efficiency and What is the potential effect of executing a conditional branch instruction on the efficiency gained by pipelining

  What are the states and what are the productions

Describe how the problem of traveling from one city to another could be framed as a production system. What are the states? What are the productions?

  Page table entries are needed for two-level paging

Assume that word 0 is part of a hole and that the highest word in memory contains valid tries are needed in the page table if traditional(one-level) paging is used? how many page table entries are needed for two-level paging, with 10 bits in ea..

  Compute average seek time and rotational latency

Seek time 1 ms for every 100 tracks traversed. Initial track position is 0. Compute average seek time & rotational latency.

  Discussion on good and bad website

Discover a good website and discuss what makes this site good in bulleted format and provide details for each item.

  Role and responsibilities of a network administrator

Create a job description of the role and responsibilities of a network administrator. Provide a detailed list of personal traits and skills necessary for a person to be a highly effective network administrator.

  1 given the following code and the assembler equivalent to

1. given the following code and the assembler equivalent to the rightfor i999 igt0 i-- xixiyiloopnbspnbsp

  A system uses a page size

A system uses a page size of the 4 Kbytes and a program size of 46 kbytes is allocated memory. what is the fragmentation?

  Write a recursive descent parser

Perform the pairwise disjointness test for each rule to show that this grammar allows top-down parsing.

  Describe process management and memory management

Describe the process management and memory management activities performed by the Operating System?

  Identify which library procedures issue system call

Is a programmer required to identify which library procedures issue system calls? Clarify your answer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd