Survey of economic impact of operating system security

Assignment Help Computer Network Security
Reference no: EM13889550

Topics

Choose one topic

Economic aspects of operating system security mechanisms

Cyber security violations usually target networks, systems or apps. This course is obviously about systems or more specifically, operating systems. As discussed in class, different security mechanisms are incorporated into operating systems such as passwords, certificates, access controls, anti-virus etc. However, little research exists in the literature on the economics of installing these security or protection mechanisms. For instance, did you know that nearly 100% of "invalid certificate" warnings are false positives? While it is certainly not advisable to connect to web sites offering invalid or expired certificates, it is common experience that such warnings usually tend to be false alarms (e.g. the website perhaps just didn't renew their certificate to avoid fees). But from an economics standpoint, it is useless effort expended by users, continuously bothered by false alarms, obstructing their productivity.

Your job is to research on any five to ten such protection or security mechanisms offered by modern operating systems and then report on the economics of having those mechanisms:

Are they truly necessary?

How often do they emit false alarms (aka. false positives)?

Analyze the economics of the mechanism. i.e. cost-benefit ratio where the time/effort/money used to install and use those mechanisms requires is compared to the benefit they offer in terms of preventing attacks.

2. Survey of economic impact of operating system security violations

Survey and report on major data breaches or cyber security attacks where weaknesses of operating systems were exploited. Summarize about four or five of them and explain the economic impacts of those attacks. i.e., how much losses were incurred and how better protection mechanisms into the OS (either by the designers or by users) would have helped mitigate those losses. Provide full details.

Reference no: EM13889550

Questions Cloud

What are the issues of the time when the book was written : One to Two pages reflection paper on the James Cone "God of the Oppressed"- How James Cone see? -The Struggle of Black people. What are the issues of the time when the book was written
Identify wireless networking concepts : Identify Wireless Networking concepts
Give a short explanation of the title of the article : Having read the full article, give a short explanation of the title of the article, or why B. thinks that Christians cannot be "post-racial
Context of the definition of externalities : Is it a good idea for the government to require automobile manufacturers to include pollution control devices, and certain safety devices (i.e. air bags) in every car sold in the U.S.? Explain from the context of the definition of externalities.
Survey of economic impact of operating system security : Survey of economic impact of operating system security violations
Similarities or differences in ets and its affect : Carbon Tax/Emission Trading scheme – Compare Australia with one of these countries or group of countries like Europe,USA and China/India and discuss the similarities or differences in ETS and its affect on the economy
What are the current issues of retailers and merchants : Definition and origin of Omni-channel retailing: What is Omni-channel retailing? Current issues in Omni-channel retailing: What are the current issues of retailers and merchants
Create a constant to hold the desired duration of workout : Creates an instance of the FiFiWorkout.java class. Gets input for first name. Create a constant to hold the desired duration of workout. Set it to 30.
Identify a diversity situation or cultural dilemma : Identify a diversity situation or cultural dilemma that is prevalent in today's society. a.Provide an analysis of the topic, including historical perspective and current day situation.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd