Description
Write 4–6 pages in which you identify the network operating system mitigations available to the company in the case study, which will ensure the selection of the most efficient and secure technology to run the business owner's new venture.
- Explain the concept of system services and how they contribute to the overall security profile of an operating system.
- Explain the security benefits available through domain separation, process isolation, resource encapsulation, and least privilege.
- Describe controls that mitigate operating system threats and vulnerabilities.
- Explain the role of operating system updates and patches as a security control.
- Describe how the operating system achieves separation of domain, processes, and resources.
- Explain the concept of least privilege as a function of operating system and application configuration and management.
- Describe how an operating system defends itself against attacks.
- Describe controls necessary to defend against network and network operating system vulnerabilities.
Additional Requirements
- Written communication: Written communication is free of errors that detract from the overall message.
- APA formatting: Use current APA style and formatting guidelines.
- Length: 4–6 pages, excluding the references page.
- Font and font size: Times New Roman, 12 point.
NOS Signature Mitigations Scoring Guide
NOS Signature Mitigations Scoring Guide Grading Rubric Criteria Non-performance Basic Proficient Distinguished Explain the concept of system services and how they contribute to the overall security profile of an operating system.
Does not explain the concept of system services and how they contribute to the overall security profile of an operating system. Explains incompletely or inaccurately the concept of system services and how they contribute to the overall security profile of an operating system. Explains the concept of system services and how they contribute to the overall security profile of an operating system. Explains the concept of system services and how they contribute to the overall security profile of an operating system, including the use of supporting examples. Explain the security benefits available through domain separation, process isolation, resource encapsulation, and least privilege.
Does not explain the security benefits available through domain separation, process isolation, resource encapsulation, and least privilege. Explains incompletely or inaccurately the security benefits available through domain separation, process isolation, resource encapsulation, and least privilege. Explains the security benefits available through domain separation, process isolation, resource encapsulation, and least privilege. Explains the security benefits available through domain separation, process isolation, resource encapsulation, and least privilege, including the use of supporting examples. Describe controls that mitigate operating system threats and vulnerabilities.
Does not describe controls that mitigate operating system threats and vulnerabilities. Describes incompletely or inaccurately controls that mitigate operating system threats and vulnerabilities. Describes controls that mitigate operating system threats and vulnerabilities. Describes controls that mitigate operating system threats and vulnerabilities, including the use of supporting examples. Explain the role of operating system updates and patches as a security control.
Does not explain the role of operating system updates and patches as a security control. Explains incompletely or inaccurately the role of operating system updates and patches as a security control. Explains the role of operating system updates and patches as a security control. Explains the role of operating system updates and patches as a security control, including the use of supporting examples. Describe how the operating system achieves separation of domain, processes, and resources.
Does not describe how the operating system achieves separation of domain, processes, and resources. Describes incompletely or inaccurately how the operating system achieves separation of domain, processes, and resources. Describes how the operating system achieves separation of domain, processes, and resources. Describes how the operating system achieves separation of domain, processes, and resources, including the use of supporting examples. Explain the concept of least privilege as a function of operating system and application configuration and management.
Does not explain the concept of least privilege as a function of operating system and application configuration and management. Explains incompletely or inaccurately the concept of least privilege as a function of operating system and application configuration and management. Explains the concept of least privilege as a function of operating system and application configuration and management. Explains the concept of least privilege as a function of operating system and application configuration and management, including the use of supporting examples. Describe how an operating system defends itself against attacks.
Does not describe how an operating system defends itself against attacks. Describes incompletely or inaccurately how an operating system defends itself against attacks. Describes how an operating system defends itself against attacks. Describes how an operating system defends itself against attacks, including the use of supporting examples. Describe controls necessary to defend against network and network operating system vulnerabilities.
Does not describe controls necessary to defend against network and network operating system vulnerabilities. Describes, incompletely or inaccurately, controls necessary to defend against network and network operating system vulnerabilities. Describes controls necessary to defend against network and network operating system vulnerabilities. Describes controls necessary to defend against network and network operating system vulnerabilities, including the use of supporting examples. Exhibits proficiency in writing and use of APA style and format.
Does not exhibit proficiency in writing and use APA style and format. Exhibits a low level of proficiency in writing and use of APA style and format. Exhibits proficiency in writing and use of APA style and format. Exhibits a high level of proficiency in writing and use of APA style and format.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Here you go buddy.
Running head: NOS SIGNATURE MITIGATION
NOS Signature Mitigation
Student’s Name
Instructional Affiliation
Date
1
NOS SIGNATURE MITIGATION
2
NOS Signature Mitigation
Concept of System Services
The operating system (OS) is obliged to perform some set tasks which may be
programmed or at times voluntary to enhance its security. Precisely, system services refer to the
various tasks the OS handles that include keyboard and mouse inputs. Also, it factors some
outputs although it is imperative they happen in the appropriate manner. Other detailed examples
of such tasks include context switching and scheduling; this one ensures that the OS CPU has got
enough time to execute instructions as they come from different areas. In this case, the areas
referred to the different input and output commands.
In a way to answer how system services contribute to the OS security, it is imperative to
evaluate the different connections between the OS tasks and security. For instance, in memory
management, the OS is responsible for facilitating the allocation of memory to processes. In this
case, if it does not happen as expected, the processes can be attacked and become slower or
incomplete. Another case scenario is inter-process communication which ensures the various
processes that run concurrently can communicate with each other. Above all, there is the issue of
interrupt handling which can be compromised if the processes do not run freely or as the systems
program each case (López & Zhou, 2008). Either way, the risk of external attack intensifies,
which can harm the system as well.
Security Benefits
Domain Separation: Compared to the case of separated instances (SI), domain separation
is one way to provide multi-tenancy support. ...