OS AND APPLICATION SECURITY STRATEGY Instructions For this assignment, complete the following components to secure your applications and operating systems: · Describe threats and vulnerabilities...

1 answer below »

OS AND APPLICATION SECURITY STRATEGY


Instructions


For this assignment, complete the following components to secure your applications and operating systems:


· Describe threats and vulnerabilities associated with at least two operating systems.


· Describe an anti-malware solution for the organization and indicate which operating systems it supports. Include cost, support, and implementation specifications.


· Select a suitable intrusion detection system (IDS) solution for the organization and explain the reasoning for your suggestion. Include operating systems supported, cost, support, and implementation specifications.


· Describe at least two control strategies you would consider implementing for securing the company's Web-based infrastructure.


· Describe at least two control strategies you would consider implementing for securing the company's database infrastructure.


· Define two items that you would include in the organization's operating system security-hardening procedures.


· You are encouraged to provide resources and citations. Any references should be formatted according to APA style (seeEvidence and APAfor more information).


Additionally, this week's assignment must be completed using theCourse Project Template [DOCX].


Refer to the scoring guide to ensure that you meet the grading criteria for this assignment. Submit your document in the assignment area.


Competencies Measured


By successfully completing this assignment, you will demonstrate your proficiency in the following course competencies and scoring guide criteria:


· Competency 2: Describe fundamental principles of IT security.


o Define two items to include in the organization's operating system security hardening procedures.


· Competency 3: Describe common vulnerabilities and threats found in IT infrastructures.


o Describe threats and vulnerabilities associated with at least two operating systems.


· Competency 4: Apply fundamental security strategies for securing IT infrastructures.


o Describe an anti-malware solution for the organization and indicate which operating systems it supports, cost, support provided, and implementation specifications.


o Select a suitable intrusion detection system (IDS) solution for the organization, and explain the reasoning for the selection, including operating systems supported, cost, support, and implementation specifications.


o Describe at least two control strategies to consider implementing for securing the company's Web-based infrastructure.


o Describe at least two control strategies to consider implementing for securing the company's database infrastructure.


Answered 9 days AfterAug 01, 2021

Answer To: OS AND APPLICATION SECURITY STRATEGY Instructions For this assignment, complete the following...

Shubham answered on Aug 10 2021
136 Votes
Threats and vulnerabilities associated with two operating systems
Windows OS
· Zero day exploits have been patched with the current version of the windows that become more vulnerable (Stephanow, & Khajehmoogahi, 2017). This exploits the patch in the curre
nt version of the legacy version with the vulnerability that is exposed.
· Fake virus warnings on the windows system can appear and there is no way for detecting the virus on the system while visiting the website.
Linux OS
· Application stack vulnerabilities are the reason behind several breaches and this result in exploitation of vulnerabilities (Stephanow, & Khajehmoogahi, 2017). This is the common initial entry point for various hackers that allow the advantage of flaw in internet-facing workloads.
· Misconfiguration can be common and it is the critical security concern. The misconfiguration over the new environment can create the security concern for cloud, server less and containers.
Anti-malware solution for the organization
    Norton security solution can help in providing the anti-malware solution for the organization. It will help in providing the solution for offering a broader protection of the business by monitoring the data that are transferred over the network for a variety of potential threats. It will help in removing and detecting the threat for protecting the complete organization. This tool can help the organization in detecting the threat on a single machine. This will help in detecting and helping the computer security professionally for eradicating and blocking malware by the use of active approach for malware analysis (Marufuzzaman et al. 2019). The detection works by the identification of malicious software for examining. Windows OS can support Norton security solutions and this will help in organization in detecting malware. The cost of implementation for multiple systems can be upto $105. The software supports Microsoft Windows 7, Microsoft Windows 8/8.1 and Microsoft Windows 10. 1 GHz processor, 2 GB RAM and 300 MB of available hard disk is required for installation.
Intrusion detection system (IDS) solution for the organization
Network-Based Intrusion Detection System is the suitable solution for the organization. This will help the system in analysis and examination of network traffic. It includes a rule-based analysis engine for customization of own rules. This provides the ability for the user community to make initial NIDS implementations. This is necessary because it can help in feeding all traffic into files and it provides a...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here