Network Operating System and Application Security
Other
-
Deliverable
Write 6–8 pages describing the primary network components that should be considered as part of an IT solution that supports the business detailed in the case study:
- Describe the typical components of a modern network that contain an access control process.
- Describe the various forms of operating systems that are components of a modern network, including:
- Memory (real, virtual, and management).
- Object based versus object oriented.
- Privileged and non-privileged states.
- Processes and threads, along with their management (National Centers of Academic Excellence in Information Assurance/Cyber Defense, 2013).
- Explain the role that virtual and real memory play in the overall security profile of an operating system.
- Discuss the role of cloud computing and virtualization in operating system security.
- Explain how operating system and application security impact the overall security of modern, including:
- DMZs and proxy servers.
- Honeypots and honeynets.
- Firewalls and VPNs.
- IDS/IPS.
- Network devices (routers, switches, VPNs, and firewalls).
- Workstations.
- Mobile devices.
- Peripheral devices.
- Describe the role of the hypervisor in operating system security.
- Describe the implications of public versus private clouds in operating system security.
- Explain the role that the command line interface can play in the overall security profile of an operating system.
- Explain how operating system and application security impact the overall security of modern networks.
Additional Requirements
- Written communication: Written communication is free of errors that detract from the overall message.
- APA formatting: Use current APA style and formatting guidelines.
- Length: 6–8 pages, excluding the references page.
- Font and font size: Times New Roman, 12 point.
Reference
National Centers of Academic Excellence in Information Assurance/Cyber Defense (IA/CD). (2013). CAE knowledge units. Retrieved from http://www.cisse.info/pdf/2014/2014%20CAE%20Knowle…
Criteria | Non-performance | Basic | Proficient | Distinguished |
---|---|---|---|---|
Describe the typical components of a modern network that contain an access control process. |
Does not describe the typical components of a modern network that contain an access control process. | Describes incompletely or inaccurately the typical components of a modern network that contain an access control process. | Describes the typical components of a modern network that contain an access control process. | Describes the typical components of a modern network that contain an access control process, including the use of supporting examples. |
Describe the various forms of operating systems that are components of a modern network. |
Does not describe the various forms of operating systems that are components of a modern network. | Describes incompletely or inaccurately the various forms of operating systems that are components of a modern network. | Describes the various forms of operating systems that are components of a modern network. | Describes the various forms of operating systems that are components of a modern network, including the use of supporting examples. |
Explain the role that virtual and real memory play in the overall security profile of an operating system. |
Does not explain the role that virtual and real memory play in the overall security profile of an operating system. | Explains incompletely or inaccurately the role that virtual and real memory play in the overall security profile of an operating system. | Explains the role that virtual and real memory play in the overall security profile of an operating system. | Explains the role that virtual and real memory play in the overall security profile of an operating system, including the use of supporting examples. |
Discuss the role of cloud computing and virtualization in operating system security. |
Does not discuss the role of cloud computing and virtualization in operating system security. | Discusses incompletely or inaccurately the role of cloud computing and virtualization in operating system security. | Discusses the role of cloud computing and virtualization in operating system security. | Discusses the role of cloud computing and virtualization in operating system security, including the use of supporting examples. |
Explain how operating system and application security impact the overall security of modern networks. |
Does not explain how operating system and application security impact the overall security of modern networks. | Explains incompletely or inaccurately how operating system and application security impact the overall security of modern networks. | Explains how operating system and application security impact the overall security of modern networks. | Explains how operating system and application security impact the overall security of modern networks, including the use of supporting examples |
Describe the role of the hypervisor in operating system security. |
Does not describe the role of the hypervisor in operating system security. | Describes incompletely or inaccurately the role of the hypervisor in operating system security. | Describes the role of the hypervisor in operating system security. | Describe the role of the hypervisor in operating system security, including the use of supporting examples. |
Describe the implications of public versus private clouds in operating system security. |
Does not describe the implications of public versus private clouds in operating system security. | Describes incompletely or inaccurately the implications of public versus private clouds in operating system security. | Describes the implications of public versus private clouds in operating system security. | Describes the implications of public versus private clouds in operating system security, including the use of supporting examples. |
Explain the role that the command line interface can play in the overall security profile of an operating system. |
Does not explain the role that the command line interface can play in the overall security profile of an operating system. | Explains incompletely or inaccurately the role that the command line interface can play in the overall security profile of an operating system. | Explains the role that the command line interface can play in the overall security profile of an operating system. | Explains the role that the command line interface can play in the overall security profile of an operating system, including the use of supporting examples. |
Explain how operating system and application security impact the overall security of modern networks |
Does not explain how operating system and application security impact the overall security of modern networks. | Explains incompletely or inaccurately how operating system and application security impact the overall security of modern networks. | Explains how operating system and application security impact the overall security of modern networks. | Explains how operating system and application security impact the overall security of modern networks, including the use of supporting examples. |
#write essay #research paper #blog writing #article writing #academic writer #reflective paper #essay pro #types of essays #write my essay #reflective essay #paper writer #essay writing service #essay writer free #essay helper #write my paper #assignment writer #write my essay for me #write an essay for me #uk essay #thesis writer #dissertation writing services #writing a research paper #academic essay #dissertation help #easy essay #do my essay #paper writing service #buy essay #essay writing help #essay service #dissertation writing #online essay writer #write my paper for me #types of essay writing #essay writing website #write my essay for free #reflective report #type my essay #thesis writing services #write paper for me #research paper writing service #essay paper #professional essay writers #write my essay online #essay help online #write my research paper #dissertation writing help #websites that write papers for you for free #write my essay for me cheap #pay someone to write my paper #pay someone to write my research paper
#Essaywriting #Academicwriting #Assignmenthelp #Nursingassignment #Nursinghomework #Psychologyassignment #Physicsassignment #Philosophyassignment #Religionassignment #History #Writing #writingtips #Students #universityassignment #onlinewriting #savvyessaywriters #onlineprowriters #assignmentcollection #excelsiorwriters #writinghub #study #exclusivewritings #myassignmentgeek #expertwriters #art #transcription #grammer #college #highschool #StudentsHelpingStudents #studentshirt #StudentShoe #StudentShoes #studentshoponline #studentshopping #studentshouse #StudentShoutout #studentshowcase2017 #StudentsHub #studentsieuczy #StudentsIn #studentsinberlin #studentsinbusiness #StudentsInDubai #studentsininternational