What is security management?

Anonymous
timer Asked: Feb 7th, 2018
account_balance_wallet $20

Question description

    • Security Management
      • Develop a security incident response policy for the organization.
      • Provide an evaluation and recommendation for tools and processes to help analyze and track security threats and incident responses for all 3 operating systems categories (UNIX, open source, and Windows).
      • Provide an evaluation and recommendation for forensics tools and policies to use in response to security incidents for all 3 operating systems categories (UNIX, open source, and Windows).
    • Security Cost/Benefit Analysis
      • Provide a cost/benefit analysis for the tools and processes recommended throughout the Operating Systems Security Policies document versus the cost to the organization of security incidents.
      • Add a long-term cost/benefit analysis that includes expected changes in the organization that might affect the costs and benefits of the recommended tools and processes.
  • Operating Systems Security Policies document, final draft
    • Review the entire document for any changes and improvements that you would like to make.
    • Ensure that this final version of the plan is sufficiently detailed to allow the organization to confidently move forward with the implementation of the operating system security plan based on your recommendations.
    • Any previous instructor feedback should be addressed with appropriate changes.

** With References

Tutor Answer

MrMark
School: University of Virginia

Hello. Find the answer attached.Thank you.

Running head: OPERATING SYSTEM SECURITY MANAGEMENT

Operating System Security Management
Name:
Institution:

1

OPERATING SYSTEM SECURITY MANAGEMENT

2

Operating System Security Management
Security management is the process of identifying the assets of an organization including
buildings, systems, machines and other critical information facilities, then making policies which
are then documented and implemented aimed at protecting the same. A company uses several
security management plans like risk assessment, threat assessment, classification of information
and system vulnerabilities.
MegaMind is a fictitious research company that relies heavily on the use of the internet to
conduct research, store data and passes information from one employee to another. The company
has over 300 employees and has set up more than 200 computer systems in its premises.
Because of the high flow of data, a security policy is needed to monitor and analyze network
configurations of the current operating systems. The company uses three different operating
systems which include Window 7, operational in Dell Computers, Unix, operational in HP and
Dell Computers and examples of Open Source like OpenStack and VMWare.
There are several tools as well as policies that can be used to prevent risks in the different
operating systems that MegaMind is using.
UNIX
File Permission: This tool can be used to enhance the confidentiality of information and data
because it only allowed selected people to gain access. Anyone else who is not allowed to access
certain information cannot do so since the access is restricted (Narte...

flag Report DMCA
Review

Anonymous
Thanks, good work

Similar Questions
Hot Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors