Northern Virginia College OS Architecture and Security Vulnerabilities Discussion

User Generated

xunyvsn20

Computer Science

Northern Virginia Community College

Description

Since Windows makes up the majority of consumer laptops and desktops, this week we focus on the internal workings of the Windows operating system, the registry hives, the security vulnerabilities, and learn how to “harden a box”


Analyze your SOHO network for vulnerabilities

·Examine the network you have built and try to determine where you think security vulnerabilities exist.

·Is there a security hole that cannot be patched due to the requirements engineering process?

·Analyze the need of individual systems for security measures

oMake sure you check for any dependencies the software would need for continued normal operation.

·Plan on how the securing of these boxes should occur.

How do you know if your solution was a success? How do you know how secure is secure enough?

·Watch the LinkedIn Learning video Understand and Implement Windows 10 Security from Windows 10 for IT Pros Essential Training with Brian Posey

·Watch the LinkedIn Learning video section: Understand Permission from the course: IT Security Foundations: Operating System Security with Lisa Bock

·Do research on the internet and learn more about the “hives” and the Windows kernel architecture.

For your task, submit you the results from your Requirement Analysis on your project.

·Submit the results from step 1 on our requirements analysis for the project.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

completed

NETWORK

1

OS Architecture
Student name
Course
University

NETWORK

2

Security Vulnerabilities.
a. Operating system – the OS on servers would be threats to vulnerabilities. It is essential to
harden the operating system security by enforcing software patches so that the existing
vulnerabilities re prevented (Williams et al., 2017). Operating system vulnerabilities may
be as a result of outdated patches, open ports and services.
b. WAN Network – it would pose remote access vulnerabilities
c. Storage servers – they are prone to data...


Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags