What is security management?

timer Asked: Feb 7th, 2018
account_balance_wallet $20

Question description

    • Security Management
      • Develop a security incident response policy for the organization.
      • Provide an evaluation and recommendation for tools and processes to help analyze and track security threats and incident responses for all 3 operating systems categories (UNIX, open source, and Windows).
      • Provide an evaluation and recommendation for forensics tools and policies to use in response to security incidents for all 3 operating systems categories (UNIX, open source, and Windows).
    • Security Cost/Benefit Analysis
      • Provide a cost/benefit analysis for the tools and processes recommended throughout the Operating Systems Security Policies document versus the cost to the organization of security incidents.
      • Add a long-term cost/benefit analysis that includes expected changes in the organization that might affect the costs and benefits of the recommended tools and processes.
  • Operating Systems Security Policies document, final draft
    • Review the entire document for any changes and improvements that you would like to make.
    • Ensure that this final version of the plan is sufficiently detailed to allow the organization to confidently move forward with the implementation of the operating system security plan based on your recommendations.
    • Any previous instructor feedback should be addressed with appropriate changes.

** With References

Tutor Answer

School: University of Virginia

Hello. Find the answer attached.Thank you.


Operating System Security Management




Operating System Security Management
Security management is the process of identifying the assets of an organization including
buildings, systems, machines and other critical information facilities, then making policies which
are then documented and implemented aimed at protecting the same. A company uses several
security management plans like risk assessment, threat assessment, classification of information
and system vulnerabilities.
MegaMind is a fictitious research company that relies heavily on the use of the internet to
conduct research, store data and passes information from one employee to another. The company
has over 300 employees and has set up more than 200 computer systems in its premises.
Because of the high flow of data, a security policy is needed to monitor and analyze network
configurations of the current operating systems. The company uses three different operating
systems which include Window 7, operational in Dell Computers, Unix, operational in HP and
Dell Computers and examples of Open Source like OpenStack and VMWare.
There are several tools as well as policies that can be used to prevent risks in the different
operating systems that MegaMind is using.
File Permission: This tool can be used to enhance the confidentiality of information and data
because it only allowed selected people to gain access. Anyone else who is not allowed to access
certain information cannot do so since the access is restricted (Narte...

flag Report DMCA

Thanks, good work

Similar Questions
Hot Questions
Related Tags

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors