Explain windows vulnerabilities and linux vulnerabilities


Assignment: Computer Science and Security Assessment Report

Part I: Defining the OS

Brief explanation of operating systems (OS) fundamentals and information systems architectures.

1) Explain the user's role in an OS.

2) Explain the differences between kernel applications of the OS and the applications installed by an organization or user.

3) Describe the embedded OS.

4) Describe how operating systems fit in the overall information systems architecture, of which cloud computing is a emerging, distributed computing network architecture.

Include a brief definition of operating systems and information systems in your SAR.

Part II: OS Vulnerabilities

1) Explain Windows vulnerabilities and Linux vulnerabilities.

2) Explain the Mac OS vulnerabilities, and vulnerabilities of mobile devices.

3) Explain the motives and methods for intrusion of MS and Linux operating systems.

4) Explain the types of security management technologies such as intrusion detection and intrusion prevention system

5) Describe how and why different corporate and government systems are targets.

6) Describe different types of intrusions such as SQL PL/SQL, XML, and other injections

Format your assignment according to the following formatting requirements:

(1) The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

(2) The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

(3) Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Operating System: Explain windows vulnerabilities and linux vulnerabilities
Reference No:- TGS03100595

Now Priced at $50 (50% Discount)

Recommended (93%)

Rated (4.5/5)