Preview

Os Security

Satisfactory Essays
Open Document
Open Document
369 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Os Security
1. What are the relative advantages and disadvantages of at least three different measures used to protect operating systems?
2. The ease of implementation of the measures.
3. The associated security management issues related to measures discussed above.
4. The ranking of the measures from best to worst with supporting rationale
Answer
Antivirus: Antivirus is the easiest protective measure that can be implemented on an operating system, and is also usually very easy to maintain. An update schedule is scheduled, or the antivirus software is configured to be managed by a central antivirus server which disseminates updates and virus signatures. Having an up-to-date anti-virus is always a good idea; it doesn't take much work, and offers a decent amount of protection.

Image-Locking software: This type of solution which exists in software such as Deep Freeze takes an image of the computer on startup to which it reverts after each restart. While this does little to prevent the computer from being compromised, it provides the ability to undo all changes, including any changes an attacker may have made, by restarting the computer. This is more difficult to implement, and is not an acceptable solution on hosts that need to maintain dynamic information, such as a database, as it would lose all new information entered since the image was created on reboot.

Host Intrusion Detection System: A Host Intrusion Detection system is similar to Antivirus in that it looks for suspicious activity and compares against a definition file, but it also inspects network traffic that comes through the local interface. This allows the HIDS to detect an attack before it has actually put anything on your computer. HIDS also creates a host baseline, to which changes are reported to an administrator. This can result in a lot of logs if changes are made on a regular basis. This solution is both difficult to configure and maintain.

In a real environment, you aren't restricted

You May Also Find These Documents Helpful

  • Powerful Essays

    Unit 7 P3 Research Paper

    • 1234 Words
    • 5 Pages

    Virus protection – virus protection protects a computer system from malicious viruses and Trojans and worms which you can be infected by through the internet or email or downloading files or through a USB flash drive etc. virus protection usually consists of a firewall, virus scanner, virus remover and spyware. With virus protection you can perform a scan on your computer to check if you have been infected by any viruses or Trojans or worms. With some virus protections software’s you can scan your computer then it will ask you if you want the viruses removed, also if any programs have been infected the virus protection will ask you if you want the infected program deleted, most virus…

    • 1234 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Identify any hardware or programming that may be basic – Ultimately the security of the framework will be a basic segment to keep up business and individual records guaranteed. There are a considerable measure of programming choices available, for instance, McAfee or Symantec that offers a framework protection bundle that consolidates Anti-disease security, Network Firewall, Password organization, Anti-Spam Technology, data encryption and data fortification. The last will be a major instrument to setup remembering the true objective to keep up supervision of data in case of hard plate crash or any emergency that requires a structure restore.…

    • 605 Words
    • 3 Pages
    Good Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The only zero cost opportunity, standardizing polices and procedures, is also the most difficult. Processes for incident response, patch management, and preventative maintenance must be developed, refined and communicated to the appropriate staff. Incident response processes must further be exercised so all incident responders know exactly what to do in the event of a (D)DoS. Development and deployment policies must be developed defining the process for development and deployment and use of University owned and managed computing devices. Security must be forefront-outlining security in the software development life cycle (SDLC) for both University developed applications and off the shelf applications.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    There are several different types of controls that you can take advantage of for securing your servers. Below are official guidelines from the (National Institute for Standards and Technology), or NIST.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By enabling password protection on all workstations and implementing a three try timeout/lockout on an un-successful entered password, you can protect your company from unauthorized users trying to gain access by password hacking.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 2 Instructions

    • 389 Words
    • 2 Pages

    Analyze a mixed-version Microsoft Windows environment and identify the issues described in Microsoft Security Advisories.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Hardware can be used to protect the network from outside threats. Intrusion detection systems (IDS) automate detection of threats and attack through traffic analysis. Cisco’s IDS “delivers a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, along with bandwidth and e-Business application attacks” (Cisco Systems, 2007, Cisco Intrusion Detection). They take this one-step further with an intrusion prevention systems (IPS). IPS shifts the focus on the attacker, not the attack itself, by increasing the accuracy of threat prevention through global threat analysis (Cisco Systems, 2012, Intrusion Prevention System with Global Correlation). The Cisco Adaptive Security Appliances (ASA) “combines the industry 's most deployed stateful inspection firewall with…

    • 890 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Use intrusion prevention tools called behavior blockers that deny programsthe ability to execute operations that have not been explicitly permitted.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ceh Cheat Sheet

    • 3910 Words
    • 16 Pages

    Controls use of personal financial data HIPPA - Health Imformation Portability and Protection Act Privacy for medical records…

    • 3910 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    comparison matrix

    • 439 Words
    • 2 Pages

    Security-there is a firewall tool provided with a task bar that lets the user know of any security issues. Shell- Is environment friendly for the user and has functions that run like a PC. Rescue-This feature which is in the disk of the program, can unlock a system to let the user continue their work…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    P3 and D1 Assignment 1

    • 1224 Words
    • 3 Pages

    The use of anti-virus is paramount and having the most up to date anti-virus software with a virus information file, a database with all the known viruses that could attack your computer and having the software regularly scans the computer system is very important. It keeps you up to date with your systems status and if a virus is detected, it will alert you straight away with it offering an option to quarantine the file, to repair a file, or to delete it.…

    • 1224 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Security Plan

    • 492 Words
    • 2 Pages

    Securing a user workstation with approved updates will help prevent potential system corruption and in house data from being exposed.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Linux Security

    • 449 Words
    • 2 Pages

    IS3440 Final Exam Review IS3440 Final Exam Review skong@itt tech.edu skong@itt‐tech.edu CIA triad CIA triad Remote Access Remote Access Virtualization OSSTMM WINE Access control Access control Authentication Databases Authentication Databases Firewall support Firewall support /etc/sudoers /etc/passwd /etc/login.defs PAM Edit /etc/sudoers Edit /etc/sudoers file FHS FHS recommended to locate configuration files in the /etc/ path FHS /etc/fstab Samba Encrypted Partitions and Volumes Encrypted Partitions and Volumes…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Computers benefit from having an all-in-one computer security system in different ways depending one which system you install to your computer. All-in-one computer security systems are programs that keep not only your computer safe but all of your personal information. Many of the all-in-one computer systems, such as Nortons or AVG, protect the user with their personal stuff by securing all user names and passwords. They also clean computers from virus’, spy-ware, Trojan horses, worms, bots and rootkits. These are all things that can compromise your personal information and could cause the computer user to loose a large amount of information once their computer freezes. Usually the only way clean a computer when this happens is wiping everything off the computer and starting over. No user wants to go through this. I have personally had this happen three or four times due to getting virus’ that took over the computer. Now, I prevent that all from happening again. Not only do these security systems prevent the virus’ of all sorts but it also prevents spyware. Spyware is how hackers are able to get all of your personal information to use at their own disposal. Many of the security devices do live checks on the websites that you are visiting or try to visit to make sure that they are safe and real sites. If the site is a joke or dangerous to your computer it will not allow you to visit that site or will warn you before you continue on. Having a security system such as Nortons and AVG allows the user to download and share files without worrying about contracting a virus from the person/program they are downloading from. The best thing for to me that security systems offer is the firewall. The firewall prevents live attacks on your computer while you are on it. I have had Nortons block several attacks to my computer. The only thing that is a downfall to computer security systems is that they can cost quite a bit depending on which you get and what all they cover. To…

    • 382 Words
    • 2 Pages
    Satisfactory Essays