OS AND APPLICATION SECURITY STRATEGY
Instructions
For this assignment, complete the following components to secure your applications and operating systems:
· Describe threats and vulnerabilities associated with at least two operating systems.
· Describe an anti-malware solution for the organization and indicate which operating systems it supports. Include cost, support, and implementation specifications.
· Select a suitable intrusion detection system (IDS) solution for the organization and explain the reasoning for your suggestion. Include operating systems supported, cost, support, and implementation specifications.
· Describe at least two control strategies you would consider implementing for securing the company's Web-based infrastructure.
· Describe at least two control strategies you would consider implementing for securing the company's database infrastructure.
· Define two items that you would include in the organization's operating system security-hardening procedures.
· You are encouraged to provide resources and citations. Any references should be formatted according to APA style (seeEvidence and APAfor more information).
Additionally, this week's assignment must be completed using theCourse Project Template [DOCX].
Refer to the scoring guide to ensure that you meet the grading criteria for this assignment. Submit your document in the assignment area.
Competencies Measured
By successfully completing this assignment, you will demonstrate your proficiency in the following course competencies and scoring guide criteria:
· Competency 2: Describe fundamental principles of IT security.
o Define two items to include in the organization's operating system security hardening procedures.
· Competency 3: Describe common vulnerabilities and threats found in IT infrastructures.
o Describe threats and vulnerabilities associated with at least two operating systems.
· Competency 4: Apply fundamental security strategies for securing IT infrastructures.
o Describe an anti-malware solution for the organization and indicate which operating systems it supports, cost, support provided, and implementation specifications.
o Select a suitable intrusion detection system (IDS) solution for the organization, and explain the reasoning for the selection, including operating systems supported, cost, support, and implementation specifications.
o Describe at least two control strategies to consider implementing for securing the company's Web-based infrastructure.
o Describe at least two control strategies to consider implementing for securing the company's database infrastructure.