NOS Signature Mitigation

User Generated

zontvey215

Other

Description

Write 4–6 pages in which you identify the network operating system mitigations available to the company in the case study, which will ensure the selection of the most efficient and secure technology to run the business owner's new venture.

    • Explain the concept of system services and how they contribute to the overall security profile of an operating system.
    • Explain the security benefits available through domain separation, process isolation, resource encapsulation, and least privilege.
    • Describe controls that mitigate operating system threats and vulnerabilities.
    • Explain the role of operating system updates and patches as a security control.
    • Describe how the operating system achieves separation of domain, processes, and resources.
    • Explain the concept of least privilege as a function of operating system and application configuration and management.
    • Describe how an operating system defends itself against attacks.
    • Describe controls necessary to defend against network and network operating system vulnerabilities.

    Additional Requirements

    • Written communication: Written communication is free of errors that detract from the overall message.
    • APA formatting: Use current APA style and formatting guidelines.
    • Length: 4–6 pages, excluding the references page.
    • Font and font size: Times New Roman, 12 point.

    NOS Signature Mitigations Scoring Guide

    NOS Signature Mitigations Scoring Guide Grading Rubric
    Criteria Non-performance Basic Proficient Distinguished
    Explain the concept of system services and how they contribute to the overall security profile of an operating system.
    Does not explain the concept of system services and how they contribute to the overall security profile of an operating system. Explains incompletely or inaccurately the concept of system services and how they contribute to the overall security profile of an operating system. Explains the concept of system services and how they contribute to the overall security profile of an operating system. Explains the concept of system services and how they contribute to the overall security profile of an operating system, including the use of supporting examples.
    Explain the security benefits available through domain separation, process isolation, resource encapsulation, and least privilege.
    Does not explain the security benefits available through domain separation, process isolation, resource encapsulation, and least privilege. Explains incompletely or inaccurately the security benefits available through domain separation, process isolation, resource encapsulation, and least privilege. Explains the security benefits available through domain separation, process isolation, resource encapsulation, and least privilege. Explains the security benefits available through domain separation, process isolation, resource encapsulation, and least privilege, including the use of supporting examples.
    Describe controls that mitigate operating system threats and vulnerabilities.
    Does not describe controls that mitigate operating system threats and vulnerabilities. Describes incompletely or inaccurately controls that mitigate operating system threats and vulnerabilities. Describes controls that mitigate operating system threats and vulnerabilities. Describes controls that mitigate operating system threats and vulnerabilities, including the use of supporting examples.
    Explain the role of operating system updates and patches as a security control.
    Does not explain the role of operating system updates and patches as a security control. Explains incompletely or inaccurately the role of operating system updates and patches as a security control. Explains the role of operating system updates and patches as a security control. Explains the role of operating system updates and patches as a security control, including the use of supporting examples.
    Describe how the operating system achieves separation of domain, processes, and resources.
    Does not describe how the operating system achieves separation of domain, processes, and resources. Describes incompletely or inaccurately how the operating system achieves separation of domain, processes, and resources. Describes how the operating system achieves separation of domain, processes, and resources. Describes how the operating system achieves separation of domain, processes, and resources, including the use of supporting examples.
    Explain the concept of least privilege as a function of operating system and application configuration and management.
    Does not explain the concept of least privilege as a function of operating system and application configuration and management. Explains incompletely or inaccurately the concept of least privilege as a function of operating system and application configuration and management. Explains the concept of least privilege as a function of operating system and application configuration and management. Explains the concept of least privilege as a function of operating system and application configuration and management, including the use of supporting examples.
    Describe how an operating system defends itself against attacks.
    Does not describe how an operating system defends itself against attacks. Describes incompletely or inaccurately how an operating system defends itself against attacks. Describes how an operating system defends itself against attacks. Describes how an operating system defends itself against attacks, including the use of supporting examples.
    Describe controls necessary to defend against network and network operating system vulnerabilities.
    Does not describe controls necessary to defend against network and network operating system vulnerabilities. Describes, incompletely or inaccurately, controls necessary to defend against network and network operating system vulnerabilities. Describes controls necessary to defend against network and network operating system vulnerabilities. Describes controls necessary to defend against network and network operating system vulnerabilities, including the use of supporting examples.
    Exhibits proficiency in writing and use of APA style and format.
    Does not exhibit proficiency in writing and use APA style and format. Exhibits a low level of proficiency in writing and use of APA style and format. Exhibits proficiency in writing and use of APA style and format. Exhibits a high level of proficiency in writing and use of APA style and format.

Unformatted Attachment Preview

Jack's Wine and Coffee Shop – A Start-Up Case Study Jack Tower has had a dream for years to begin a coffee and wine shop that he can run in his neighborhood in his retirement. He has finally achieved the financial goals necessary to embark on the adventure and has leased the space. He has set about hiring experts to help him get his business up and running, and you are his choice for providing him the guidance he needs to set up an efficient and secure data and communications network. His ultimate goal is to run a small shop with no plans for growth or expansion. Your first task is to establish the necessary technological components that Jack will need to purchase in order to make the network successful. You will also identify design considerations related to virtual, cloud, wireless, point of sale, or other solutions, as well as consideration of building a traditional wired network. The second facet of this project is to hone in on the applications and database software that are appropriate for use in Jack's shop. Among the most important items to consider are the security controls that are available and are easily administered. The third facet of this project is to research network operating system threats and vulnerabilities as preparation for selecting the most appropriate NOS software to use in support of Jack's new business. The fourth component of this project is to review the means by which the application and database software vulnerabilities that you have identified can be mitigated in order to ensure that there are no unknown features that would hinder the proper selection of technologies. The fifth component of this project is to review the means by which the network operating system threats and vulnerabilities faced by this project can be mitigated in order to ensure that there are no unknown features that would hinder the proper selection of technologies. The sixth component of this project is to explore the role of encryption in the development of Jack's network by gathering foundational information that highlights the way this tool can be integrated into various aspects of the technologies.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Here you go buddy.

Running head: NOS SIGNATURE MITIGATION

NOS Signature Mitigation
Student’s Name

Instructional Affiliation

Date

1

NOS SIGNATURE MITIGATION

2
NOS Signature Mitigation

Concept of System Services

The operating system (OS) is obliged to perform some set tasks which may be
programmed or at times voluntary to enhance its security. Precisely, system services refer to the
various tasks the OS handles that include keyboard and mouse inputs. Also, it factors some
outputs although it is imperative they happen in the appropriate manner. Other detailed examples
of such tasks include context switching and scheduling; this one ensures that the OS CPU has got
enough time to execute instructions as they come from different areas. In this case, the areas
referred to the different input and output commands.

In a way to answer how system services contribute to the OS security, it is imperative to
evaluate the different connections between the OS tasks and security. For instance, in memory
management, the OS is responsible for facilitating the allocation of memory to processes. In this
case, if it does not happen as expected, the processes can be attacked and become slower or
incomplete. Another case scenario is inter-process communication which ensures the various
processes that run concurrently can communicate with each other. Above all, there is the issue of
interrupt handling which can be compromised if the processes do not run freely or as the systems
program each case (López & Zhou, 2008). Either way, the risk of external attack intensifies,
which can harm the system as well.

Security Benefits

Domain Separation: Compared to the case of separated instances (SI), domain separation
is one way to provide multi-tenancy support. ...


Anonymous
Great! Studypool always delivers quality work.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags