1) DISCUSSION BOARD (200 words) Watch the followingLinkedIn Learning Videosto help you with the assignments in this Unit. What is your understanding of operating systems vulnerabilities and hardening...

1 answer below »

1)</o:p>

DISCUSSION BOARD (200 words)</o:p>

Watch the followingLinkedIn Learning Videosto help you with the assignments in this Unit.

</o:p>

  • What is your understanding of operating systems vulnerabilities and hardening practices?</o:p>
  • How should one go about in hardening operating systems and applications, such as a Web Sever? (For hardening of operating systems, you should choose one operating system. For example, you could choose, Windows, UNIX, Mac, etc.).</o:p>
  • Do you think one system is really better than the others or, it is personal preference? Explain your answer.</o:p>
  • What are some reasons why an organization would choose one operating system over another? Explain in terms of systems securit</o:p>

</o:p>

2)</o:p>

INDIVIDUAL PROJECT (800 words)</o:p>

In a 4 page paper, provide the following content in the suggested format:</o:p>

  • Title page</o:p>
  • Introduction (1-2 paragraphs)</o:p>
  • Compare the differences between MAC and H-MAC (1-2 pages)</o:p>
  • Explain why using H-MAC is more secure than MAC (1-2 pages)</o:p>
  • Be prepared to fully support your argument.</o:p>
  • Give examples of commonly used MACs and H-MACs. (1-2 pages)</o:p>
  • Conclusion (1-2 paragraphs)</o:p>
  • APA Reference List</o:p>

The paper should be written using the APA writing style.</o:p>

With regard to MY assignments (IP’s, GP’s, DB’s), consider the source before you include information from Web sites.</o:p>

    • Who sponsors the Web site?</o:p>
    • Is the information on the site supported by theory and research?</o:p>
    • WIKIPEDIA, Yahoo Answers, dictionaries, encyclopedias, or similar websites, may NEVER be used or cited under any circumstances, on any assignment, discussion, or response for this class.</o:p>
Answered 1 days AfterAug 05, 2022

Answer To: 1) DISCUSSION BOARD (200 words) Watch the followingLinkedIn Learning Videosto help you with the...

Shubham answered on Aug 06 2022
18 Votes
DISCUSSION BOARD
Understanding operating system vulnerability and understanding hardening practices includes collection techniques, practices, and tools for reduction of vulnerability in the system, firmwa
re, and application. System attack and potential attacks can be eliminated and this can help in reduction of security risk.
Harding operating system and application provides a methodical approach to identify, close, audit, and control potential security vulnerability. It is needed throughout the lifecycle of the operating system that is the combination of potential backdoor and flawless technology. Thai ensures that there is comprehensive and automated vulnerability patching and identification system in place.
One system is better because it provides a framework that can help in establishing common principles, practices, and structure. It provides a standard set of processes that can be used for driving forward the strategic development of the business. It can be considered a key driver for performance and it can provide the business with the right direction.
Choosing one operating system over multiple can help the organization in the collection of regular data of the business. It can help in maintaining system integrity, confidentiality, and availability. Security includes various layers like the security of information and the security of the network.
INDIVIDUAL PROJECT
Question 1
MAC includes a small piece of information that can be used to authenticate messages. It can help in ensuring that message comes from the stated sender. MAX value can be protected by message data integrity and authenticity. It can help in figuring out changes to message content. This includes a key generation algorithm for the selection of keys from keyspace uniformly. The verification of the algorithm can help in authenticating a message that is given with tags and keys. It includes functions that are similar to cryptographic has to function and it includes various security requirements.
HMAC contains a cryptographic has to function and...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here