Computer Science
Southern New Hampshire University Operating System Security Discussion Replies

Southern New Hampshire University

Question Description

I’m studying for my Computer Science class and need an explanation.

Security is an essential element in modern operating system design. An open and unprotected TCP/IP port can present a significant network operating system vulnerability. In the first portion of your post, you will investigate and describe the security status of your operating system. Using an available workstation, execute one of the following commands on your Windows, OS X, or Linux workstation to determine the status of its TCP ports.

  • Windows: netstat -np tcp
  • Linux: netstat -at
  • OS X: netsat -p tcp

In the second portion of your post, explain what you found based upon what your operating system reports. For the third and final portion of your post, perform an internet search to determine what elements of SANS 20 you could leverage to reduce the TCP/IP vulnerabilities of your workstation. Report your findings to the class.

After your initial post, respond constructively to two of your peers’ posts. In one of your two response posts, do your best to find a student who selected the same operating system and compare/contrast the findings of their internet search of SANS 20 to your findings. In your other response post, do your best to find a student who selected a different operating system and ask at least one probing question in response to their SANS 20 findings in an attempt to gain more clarity on common issues with that operating system.

To complete this assignment, review the Discussion Rubric document.

Unformatted Attachment Preview

Graduate Discussion Rubric Overview Your active participation in the discussions is essential to your overall success this term. Discussion questions will help you make meaningful connections between the course content and the larger concepts of the course. These discussions give you a chance to express your own thoughts, ask questions, and gain insight from your peers and instructor. Directions For each discussion, you must create one initial post and follow up with at least two response posts. For your initial post, do the following:  Write a post of 1 to 2 paragraphs.  In Module One, complete your initial post by Thursday at 11:59 p.m. Eastern.  In Modules Two through Ten, complete your initial post by Thursday at 11:59 p.m. of your local time zone.  Consider content from other parts of the course where appropriate. Use proper citation methods for your discipline when referencing scholarly or popular sources. For your response posts, do the following:  Reply to at least two classmates outside of your own initial post thread.  In Module One, complete your two response posts by Sunday at 11:59 p.m. Eastern.  In Modules Two through Ten, complete your two response posts by Sunday at 11:59 p.m. of your local time zone.  Demonstrate more depth and thought than saying things like “I agree” or “You are wrong.” Guidance is provided for you in the discussion prompt. Rubric Critical Elements Comprehension Timeliness Engagement Exemplary Develops an initial post with an organized, clear point of view or idea using rich and significant detail (100%) N/A Provides relevant and meaningful response posts with clarifying explanation and detail (100%) Proficient Develops an initial post with a point of view or idea using appropriate detail (90%) Submits initial post on time (100%) Provides relevant response posts with some explanation and detail (90%) Needs Improvement Develops an initial post with a point of view or idea but with some gaps in organization and detail (70%) Submits initial post one day late (70%) Provides somewhat relevant response posts with some explanation and detail (70%) Not Evident Does not develop an initial post with an organized point of view or idea (0%) Value 20 Submits initial post two or more days late (0%) Provides response posts that are generic with little explanation or detail (0%) 10 20 Critical Elements Critical Thinking Writing (Mechanics) Exemplary Draws insightful conclusions that are thoroughly defended with evidence and examples (100%) Initial post and responses are easily understood, clear, and concise using proper citation methods where applicable with no errors in citations (100%) Proficient Draws informed conclusions that are justified with evidence (90%) Needs Improvement Draws logical conclusions (70%) Not Evident Does not draw logical conclusions (0%) Value 30 Initial post and responses are easily understood using proper citation methods where applicable with few errors in citations (90%) Initial post and responses are understandable using proper citation methods where applicable with a number of errors in citations (70%) Initial post and responses are not understandable and do not use proper citation methods where applicable (0%) Total 20 100% ...
Purchase answer to see full attachment
Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Attached.

Running head: OPERATING SYSTEM SECURITY

Operating System Security
Student’s Name
Institutional Affiliation
Date

1

OPERATING SYSTEM SECURITY

2
Operating System Security

The Netstat command in windows operating system opens the TCP/IP network utility
which enables one to analyze one’s listening ports along with ongoing and incoming network
connections. The Netstat command is very useful when it comes to resolving malware issues and
diagnosing sec...

CristinaP (13803)
UT Austin

Anonymous
Solid work, thanks.

Anonymous
The tutor was great. I’m satisfied with the service.

Anonymous
Goes above and beyond expectations !

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Questions
Related Tags