List operating system type threats and vulnerabilities


Assignment

• Describe threats and vulnerabilities associated with at least two operating systems.

• List operating system type, threats, and vulnerabilities

• The goal is not a discussion of using one over the other, it is a discussion of the issues related to each and hardening best practices

• Many organizations use older Windows server operating systems, mainframe, some Linux and UNIX flavors - infrastructure will be driven by business need and application operability

• Many are moving to Android/IOS tablet and phone applications, cloud, and Internet-of-thing devices (IoT)

• See US Cert/NVD Databases for assistance in researching threats and vulnerabilities for different operating systems

Describe an anti-malware solution for the organization and indicate on which operating systems it supports.

• Should be specific to your target company or its environment (legal, compliance, security)

• List pros/cons for two different types

• Select a suitable intrusion detection system (IDS) solution for the organization and explain the reasoning for your suggestion.

• Describe at least two control strategies you would consider implementing for securing the company's web-based infrastructure.

• Describe at least two control strategies you would consider implementing for securing the company's database infrastructure.

• Define two items that you would include in the organization's operating system security hardening procedures.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Attachment:- Project-Template.rar

Request for Solution File

Ask an Expert for Answer!!
Management Information Sys: List operating system type threats and vulnerabilities
Reference No:- TGS02994468

Expected delivery within 24 Hours