Security Assessment Report

Step 1:

  • Explain the user’s role in an OS.
  • Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
  • Describe the embedded OS.
  • Describe how the systems fit in the overall information system architecture, of which cloud computing is an emerging, distributed computing network architecture.

Step 2:

  • Explain Windows vulnerabilities and Linux vulnerabilities
  • Explain Mac OS vulnerabilities, and vulnerabilities of mobile devices
  • Explain the motives and methods for intrusion of the MS and Linux operating system
  • Explain the types of security awareness technologies such as intrusion detection and intrusion prevention systems
  • Describe how and why different corporate and government systems are targets
  • Describe different types of intrusions such as SQL PL/SQL, XML and other injections

Step 3:

  • Include a description of the methodology you proposed to assess the vulnerabilities of the operating systems. Provide an explanation and reasoning of how the methodology you purpose, will determine the existence of those vulnerabilities in the organization’s OS.
  • Include a description of the applicable tools to be used, and the limitations of the tools and analyses, if any. Provide an explanation and reasoning of how the applicable tools to be used, you propose, will determine the existence of those vulnerabilities in the organization’s OS.
  • Include the projected findings from using these vulnerability assessment tools

Step 4:

  • After you provide a description of the methodology you used to make your security assessment, you will provide the actual data from the tools, the status of security and patch updates, security recommendations, and offer specific remediation guidance, to your senior leadership.
  • You will include any risk assessments associated with the security recommendations, and propose ways to address the risk either by accepting the risk, transferring the risk, mitigating the risk, or eliminating the risk.
  • Emphasize the benefits of using a free security tool such as MBSA. Then make a recommendation for using these types of tools (ie, MBSA and OpenVAS).

The deliverables for this project are as follows:

  1. Security Assessment Report (SAR): This report should be a 7-8 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.

 

CategoriesUncategorized