The operating system (OS) of an information system, computer science homework help

User Generated

oyhroreel89

Computer Science

Description

The operating system (OS) of an information system contains the software that executes the critical functions of the information system. The OS manages the computer's memory, processes, and all of its software and hardware. It allows different programs to run simultaneously and access the computer's memory, central processing unit, and storage. The OS coordinates all these activities and ensures that sufficient resources are applied. These are the fundamental processes of the information system and if they are violated by a security breach or exploited vulnerability it has the potential to have the biggest impact on your organization.

Security for operating systems consists of protecting the OS components from attacks that could cause deletion, modification, or destruction of the operating system. Threats to an OS could consist of a breach of confidential information, unauthorized modification of data, or unauthorized destruction of data. It is the job of the cybersecurity engineer to understand the operations and vulnerabilities of the OS (whether it is a Microsoft, Linux, or another type of OS), and to provide mitigation, remediation, and defense against threats that would expose those vulnerabilities or attack the OS.

There are seven steps that will help you create your final deliverables. The deliverables for this project are as follows:

  1. Security Assessment Report (SAR): This report should be a 7-8 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
  2. Nontechnical presentation: This is a set of 8-10 PowerPoint slides for upper management that summarizes your thoughts regarding the findings in your SAR.
  3. In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.

When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.

  • 1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment.
  • 2.3: Evaluate the information in logical manner to determine value and relevance.
  • 5.4: Identify potential threats to operating systems and the security features necessary to guard against them.

The audience for your security assessment report (SAR) is the leadership of your organization, which is made up of technical and nontechnical staff. Some of your audience will be unfamiliar with operating systems (OS). As such, you will begin your report with a brief explanation of operating systems fundamentals and the types of information systems.

Click on and read the following resources that provide essential information you need to know before creating a thorough and accurate OS explanation:

After reviewing the resources, begin drafting the OS overview to incorporate the following:

  1. Explain the user's role in an OS.
  2. Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
  3. Describe the embedded OS.
  4. Describe how the systems fit in the overall information system architecture, of which cloud computing is an emerging, modern web architecture.

Include a brief definition of operating systems and information systems in your SAR.

You just summarized operating systems and information systems for leadership. In your mind, you can already hear leadership saying "So what?" They are not well versed in web security issues; so in your SAR you decide to include an explanation of advantages and disadvantages of the different operating systems and their known vulnerabilities.

Prepare by first reviewing the different types of vulnerabilities and intrusions explained in these resources:

Based on what you gathered from the resources, compose the OS vulnerability section of the SAR. Be sure to:

  1. Explain Windows vulnerabilities and Linux vulnerabilities.
  2. Explain the Mac OS vulnerabilities, and vulnerabilities of mobile devices.
  3. Explain the motives and methods for intrusion of the MS and Linux operating systems;
  4. Explain the types of security awareness technologies such as intrusion detection and intrusion prevention systems.
  5. Describe how and why different corporate and government systems are targets.
  6. Describe different types of intrusions such as SQL PL/SQL, XML, and other injections

You will provide leadership with a brief overview of vulnerabilities in your SAR.

You have just finished defining the vulnerabilities an OS can have. Soon you will perform vulnerability scanning and vulnerability assessments on the security posture of your organization's operating systems. But first, consider your plan of action. Read these two resources to be sure you fully grasp the why’s and how’s of vulnerability assessments and security updates:

Then provide the leadership with the following:

  1. Include a description of the methodology you used to assess the vulnerabilities of the incorporate operating systems.
  2. Include a description of the applicable tools used, and the limitations of the tools and analyses, if any.
  3. Include the projected findings from using these vulnerability assessment tools.

In your report, discuss the strength of passwords, any IIS administrative vulnerabilities, SQL server administrative vulnerabilities, and other security updates and management of patches.

Note: You will utilize the tools in Workspace for this step. If you need help outside the classroom, you can register for the CLAB 699 Cyber Computing Lab Assistance (go to the Discussions List for registration information). Primary lab assistance is available from a team of lab assistants. Lab assistants are professionals and are trained to help you.

Click here to access the instructions for Navigating the Workspace and the Lab Setup.

Click here to access the Project 2 Workspace Exercise Instructions. Explore the tutorials and user guides to learn more about the tools you will use.

You've prepared for your assessment; now it's time to perform.

Security and vulnerability assessment analysis tools, such as Microsoft Baseline Security Analyzer (MBSA) for Windows OS and OpenVAS for Linux OS, are standalone tools designed to provide you with a streamlined method for identifying common security misconfigurations and missing security updates for the operating systems and applications. These tools work on layers 5-7 of the Open System Interconnection (OSI) model.

Enter Workspace and complete the lab activities related to operating system vulnerabilities. Utilize the tools' built-in checks to complete the following for Windows OS (e.g., using MBSA):

  1. Determine if Windows administrative vulnerabilities are present.
  2. Determine if weak passwords are being used on Windows accounts.
  3. Learn which security updates are required on each individual system.

You will also complete a similar exercise for Linux OS (e.g., using the OpenVAS tool). Select the following links to learn more about OpenVAS and computer networks:

Utilize the OpenVAS tool to complete the following:

  1. Determine if Linux vulnerabilities are present.
  2. Determine if weak passwords are being used on Linux systems.
  3. Learn which security updates are required for the Linux systems.

Knowledge acquired from this Workspace exercise and capability of this tool will help your company's client organizations secure the computer networks’ resources and protect corporate data from being stolen.

Validate and record the benefits of using these types of tools. You will include this in the SAR.

You will utilize the tools in Workspace for this step.

You have just finished working with vulnerability assessment tools for the OS and applications. You noticed that the tool you used for Windows OS (i.e., MBSA) provides dynamic assessment of missing security updates. Next, you will use the same tool to scan one or more computers by domain, IP address range, or other grouping.

Once complete, this tool provides a detailed report and instructions on how to make your system a more secure working environment. In this case, a tool such as MBSA will create and store individual XML security reports for each computer scanned and will display the reports in the graphical user interface in HTML.

You will compile your findings using both tools. Consider the unique findings of each tool, the common findings, and the differences in their capabilities. You should provide a brief discussion of this in your report.

By utilizing security vulnerability assessment tools, such as MBSA and OpenVAS, you now have a better understanding of your system's security status. Based on the results provided by these tools, as well as your learning from the previous steps, you will create the Security Assessment Report (SAR).

In your report to the leadership, emphasize the benefits of using a free security tool such as MBSA. Then make a recommendation for using these types of tools (i.e., MBSA and OpenVAS), including the results you found for both.

Remember to include these analyses and conclusions in the SAR deliverable:

  1. After you provide a description of the methodology you used to make your security assessment, you will provide the actual data from the tools, the status of security and patch updates, security recommendations, and offer specific remediation guidance, to your senior leadership.
  2. You will include any risk assessments associated with the security recommendations, and propose ways to address the risk either by accepting the risk, transferring the risk, mitigating the risk, or eliminating the risk.

Include your SAR in your final deliverable to leadership.

Based on what you have learned in the previous steps and your SAR, you will also develop a presentation for your company's leadership.

Your upper-level management team is not interested in the technical report you generated from your Workspace exercise. They are more interested in the bottom line. You must help these non­technical leaders understand the very technical vulnerabilities you have discovered. They need to clearly see what actions they must either take or approve. The following are a few questions to consider when creating your non­technical presentation:

  1. How do you present your technical findings succinctly to a non­technical audience? Your Workspace exercise report will span many pages, but you will probably not have more than 30 minutes for your presentation and follow-up discussion.
  2. How do you describe the most serious risks factually but without sounding too temperamental? No one likes to hear that their entire network has been hacked, data has been stolen, and the attackers have won. You will need to describe the seriousness of your findings while also assuring upper-level management that these are not uncommon occurrences today.
  3. How do your Workspace exercise results affect business operations? Make sure you are presenting these very technical results in business terms that upper-level management will understand.
  4. Be very clear on what you propose or recommend. Upper-level management will want to not only understand what you discovered; they will want to know what you propose as a solution. They will want to know what decisions they need to make based on your findings.

Your goal for the presentation is to convince the leadership that adopting a security vulnerability assessment tool (such as MBSA) and providing an extra security layer is a must for the company.

The deliverables for this project are as follows:

  1. Security Assessment Report (SAR): This report should be a 7-8 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
  2. Nontechnical presentation: This is a set of 8-10 PowerPoint slides for upper management that summarizes your thoughts regarding the findings in your SAR.
  3. In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.

Submit your deliverables to the assignment folder.

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.

  • 1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment.
  • 2.3: Evaluate the information in logical manner to determine value and relevance.
  • 5.4: Identify potential threats to operating systems and the security features necessary to guard against them.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: SECURITY ASSESMENT REPORT

1

Security Assessment Report
Student’s Name
Professor
Course
Date

Running Head: SECURITY ASSESMENT REPORT

2

1.1 OS overview

An operating system is the interface which increases the usability of hardware to the user. It
achieves this by allowing for processes such as process management, management of memory,
management of files, and also assists in the handling of input and output control concerned with
peripheral devices such as disc drives and printers. Information systems assist in the process of
organizing and analyzing raw data to useful information in organizations. An Information system
is vital in organizational decision making since it assists in making meaningful conclusions
through conversion of data to leading information (Laudon, &Laudon, 2013; Tanenbaum, &Bos,
2014; Stair, & Reynolds, 2013).

1.2 The user's role in an OS

An operating system provides responses to commands received. An OS user is a person or a
robot that is able to guide the operating system to provide responses. The mentioned processes
such as memory management and disk management need commands to execute. This makes user
essentials in the requirement delivery of an operating system. Users can either be developers or
end user. Basically, in an operating system, a user can either design, run, or be the end user, but
whichever way, the two types of users are hosts and guests (Laudon, &Laudon, 2013;
Tanenbaum, &Bos, 2014; Stair, & Reynolds, 2013).

1.3 The differences between kernel applications of the OS and the applications installed
by an organization or user

The Kennel mode executes unrestricted code, and provides full access to core hardware such
as the memory. It has a capacity to execute diverse Memory address references and instructions

Running Head: SECURITY ASSESMENT REPORT

3

by the CPU. In a very trusted or in a lower level operating system function, kernel mode can be
embraced with some trust. However, kernel crush is fatal and affects the entire PC. The other ode
is the user mode. The use is in control of the activities that occurs, and the code has no control
over the hardware activities of the PC. This mode has codes running under API delegation before
access of hardware and memory. This allows solation to accord protection to both hardware and
memory, and the resultant crashes under this mode can be recovered (Laudon, &Laudon, 2013;
Tanenbaum, &Bos, 2014; Stair, & Reynolds, 2013).

1.4 Describe the embedded OS.

An embedded operating system is an operating system with the capacity to only handle one
application. This is possible with devices that are dedicated to handle special functions, and not
on devices such as organizational PCs which are supposed to handle diverse varieties of tasks.
An embedded OS is very applicable in areas where security is needed, and unless embedded in
information systems, they are very secure and difficult to penetrate. Modern smart technology in
vehicle such as the BMW self-driving capability is facilitated by the vehicle’s embedded OS.
The OS can detect space and objects and can start and stop the car. It can pick calls and guide the
GPS to detect directions, but it is only specially built for the vehicle control and luxury. It cannot
be used in computers or in an organization’s OS. Embedded OS is also common in electronics
which need to deliver a certain specialized deliverable for example a home theatre or smart TV’s
OS (Laudon, &Laudon, 2013; Tanenbaum, &Bos, 2014; Stair, & Reynolds, 2013).

Running Head: SECURITY ASSESMENT REPORT

4

1.5 How the systems fit in the overall information system architecture, of which cloud
computing

Virtualization concept is embraced in merging embedded systems to cloud computing. The
embedded system should be able to store its data and operations virtually, for instance on virtual
memory. This assist the embedded system to be used virtually, for instance, run from an android
or IOS gadget. This basically means that the virtualization facilitates the merging of the
embedded OS to the cloud computing platform, even with its specialization of purpose.
However, to facilitate this interphase, a service oriented interface is required. Service oriented
architecture is the design that assists in merging embedded software to cloud computing through
the virtualization concept (Laudon, &Laudon, 2013; Tanenbaum, &Bos, 2014; Stair, &
Reynolds, 2013).

OS vulnerability
1. Windows and Linux vulnerability
Vulnerability is the threat of penetration or attack on software or an operating system.
Currently, operating systems come with some security, though the user is requested to take care
of some loopholes such as installation of device drivers and software with caution. Use of
secondary security such as antiv...


Anonymous
Great! Studypool always delivers quality work.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags