Preview

Os Security

Satisfactory Essays
Open Document
Open Document
369 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Os Security
1. What are the relative advantages and disadvantages of at least three different measures used to protect operating systems?
2. The ease of implementation of the measures.
3. The associated security management issues related to measures discussed above.
4. The ranking of the measures from best to worst with supporting rationale
Answer
Antivirus: Antivirus is the easiest protective measure that can be implemented on an operating system, and is also usually very easy to maintain. An update schedule is scheduled, or the antivirus software is configured to be managed by a central antivirus server which disseminates updates and virus signatures. Having an up-to-date anti-virus is always a good idea; it doesn't take much work, and offers a decent amount of protection.

Image-Locking software: This type of solution which exists in software such as Deep Freeze takes an image of the computer on startup to which it reverts after each restart. While this does little to prevent the computer from being compromised, it provides the ability to undo all changes, including any changes an attacker may have made, by restarting the computer. This is more difficult to implement, and is not an acceptable solution on hosts that need to maintain dynamic information, such as a database, as it would lose all new information entered since the image was created on reboot.

Host Intrusion Detection System: A Host Intrusion Detection system is similar to Antivirus in that it looks for suspicious activity and compares against a definition file, but it also inspects network traffic that comes through the local interface. This allows the HIDS to detect an attack before it has actually put anything on your computer. HIDS also creates a host baseline, to which changes are reported to an administrator. This can result in a lot of logs if changes are made on a regular basis. This solution is both difficult to configure and maintain.

In a real environment, you aren't restricted

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Antivirus Programs

    • 299 Words
    • 2 Pages

    Today, people rely on computers to create, store, and manage critical information, many times via a home computer network. Information transmitted over networks has a higher degree of security risk than information kept in a user’s home or company premises. Thus, it is crucial that they take measures to protect their computers and data from loss, damage, and misuse resulting from computer security risks. Antivirus programs are an effective way to protect a computer against viruses.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Identify any hardware or programming that may be basic – Ultimately the security of the framework will be a basic segment to keep up business and individual records guaranteed. There are a considerable measure of programming choices available, for instance, McAfee or Symantec that offers a framework protection bundle that consolidates Anti-disease security, Network Firewall, Password organization, Anti-Spam Technology, data encryption and data fortification. The last will be a major instrument to setup remembering the true objective to keep up supervision of data in case of hard plate crash or any emergency that requires a structure restore.…

    • 605 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Antivirus is constantly required as well as updated definitions databases Most viruses target the windows OS because it is the most widespread OS on the planet.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO asks you to explain why you believe it is important to secure the Windows and Unix/Linux servers from known shortcomings and vulnerabilities. Explain to your CIO what you can do to make sure the network infrastructure is more secure.…

    • 732 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Security

    • 414 Words
    • 2 Pages

    Many commercial software packages are designed with computer security features that control who can access the computer. These types of access controls use a process called identification and authentication. Identification verifies that the user is a valid user, and authentication verifies that the user is who he or she claims to be. Three common methods of authentication are remembered information, possessed objects, and biometric devices.…

    • 414 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Computers benefit from having an all-in-one computer security system in different ways depending one which system you install to your computer. All-in-one computer security systems are programs that keep not only your computer safe but all of your personal information. Many of the all-in-one computer systems, such as Nortons or AVG, protect the user with their personal stuff by securing all user names and passwords. They also clean computers from virus’, spy-ware, Trojan horses, worms, bots and rootkits. These are all things that can compromise your personal information and could cause the computer user to loose a large amount of information once their computer freezes. Usually the only way clean a computer when this happens is wiping everything off the computer and starting over. No user wants to go through this. I have personally had this happen three or four times due to getting virus’ that took over the computer. Now, I prevent that all from happening again. Not only do these security systems prevent the virus’ of all sorts but it also prevents spyware. Spyware is how hackers are able to get all of your personal information to use at their own disposal. Many of the security devices do live checks on the websites that you are visiting or try to visit to make sure that they are safe and real sites. If the site is a joke or dangerous to your computer it will not allow you to visit that site or will warn you before you continue on. Having a security system such as Nortons and AVG allows the user to download and share files without worrying about contracting a virus from the person/program they are downloading from. The best thing for to me that security systems offer is the firewall. The firewall prevents live attacks on your computer while you are on it. I have had Nortons block several attacks to my computer. The only thing that is a downfall to computer security systems is that they can cost quite a bit depending on which you get and what all they cover. To…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security Plan

    • 492 Words
    • 2 Pages

    Securing a user workstation with approved updates will help prevent potential system corruption and in house data from being exposed.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    System Security

    • 1174 Words
    • 5 Pages

    a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.…

    • 1174 Words
    • 5 Pages
    Better Essays
  • Good Essays

    P3 and D1 Assignment 1

    • 1224 Words
    • 3 Pages

    The use of anti-virus is paramount and having the most up to date anti-virus software with a virus information file, a database with all the known viruses that could attack your computer and having the software regularly scans the computer system is very important. It keeps you up to date with your systems status and if a virus is detected, it will alert you straight away with it offering an option to quarantine the file, to repair a file, or to delete it.…

    • 1224 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ceh Cheat Sheet

    • 3910 Words
    • 16 Pages

    Controls use of personal financial data HIPPA - Health Imformation Portability and Protection Act Privacy for medical records…

    • 3910 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    Linux Security

    • 8388 Words
    • 34 Pages

    The security features that UNIX-like systems such as Linux rely on are making these systems clearly superior to the rest of OSson the market. These features encompass root account security measurements, enhanced file accessing options, advanced data verification, storage encryptions and the list is not an exhaustive on. You can choose to watch now a surf shop be launched over the internet and expect for your Linux OS to better cope with the new website, rather than a Windows system, for instance.…

    • 8388 Words
    • 34 Pages
    Good Essays
  • Satisfactory Essays

    Linux Security

    • 449 Words
    • 2 Pages

    IS3440 Final Exam Review IS3440 Final Exam Review skong@itt tech.edu skong@itt‐tech.edu CIA triad CIA triad Remote Access Remote Access Virtualization OSSTMM WINE Access control Access control Authentication Databases Authentication Databases Firewall support Firewall support /etc/sudoers /etc/passwd /etc/login.defs PAM Edit /etc/sudoers Edit /etc/sudoers file FHS FHS recommended to locate configuration files in the /etc/ path FHS /etc/fstab Samba Encrypted Partitions and Volumes Encrypted Partitions and Volumes…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    HP S Intrusion Prevention System (IPS) N Series Data sheet Product overview The HP S Intrusion Prevention System (IPS) N Series achieves a new level of inline, real-time protection, providing proactive network security for today's and tomorrow's real-world network traffic and data centers. The IPS platform's next-generation architecture adds significant capacity for deep packet traffic inspection, and its modular software design enables the addition of valuable network protection services to its proven intrusion prevention solution. This new industry-leading IPS platform redefines intrusion prevention as a foundation for comprehensive network security.…

    • 3933 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    System security for user

    • 499 Words
    • 2 Pages

    1. Always use a strong password with a combination of alphabets, numbers and special characters…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Separation of the operating system files from user files may result into a better and secure system.…

    • 725 Words
    • 3 Pages
    Good Essays