Network Operating System and Application Security

Other

  • Deliverable

    Write 6–8 pages describing the primary network components that should be considered as part of an IT solution that supports the business detailed in the case study:

    • Describe the typical components of a modern network that contain an access control process.
    • Describe the various forms of operating systems that are components of a modern network, including:
      • Memory (real, virtual, and management).
      • Object based versus object oriented.
      • Privileged and non-privileged states.
      • Processes and threads, along with their management (National Centers of Academic Excellence in Information Assurance/Cyber Defense, 2013).
    • Explain the role that virtual and real memory play in the overall security profile of an operating system.
    • Discuss the role of cloud computing and virtualization in operating system security.
    • Explain how operating system and application security impact the overall security of modern, including:
      • DMZs and proxy servers.
      • Honeypots and honeynets.
      • Firewalls and VPNs.
      • IDS/IPS.
      • Network devices (routers, switches, VPNs, and firewalls).
      • Workstations.
      • Mobile devices.
      • Peripheral devices.
    • Describe the role of the hypervisor in operating system security.
    • Describe the implications of public versus private clouds in operating system security.
    • Explain the role that the command line interface can play in the overall security profile of an operating system.
    • Explain how operating system and application security impact the overall security of modern networks.

    Additional Requirements

    • Written communication: Written communication is free of errors that detract from the overall message.
    • APA formatting: Use current APA style and formatting guidelines.
    • Length: 6–8 pages, excluding the references page.
    • Font and font size: Times New Roman, 12 point.
    Reference

    National Centers of Academic Excellence in Information Assurance/Cyber Defense (IA/CD). (2013). CAE knowledge units. Retrieved from http://www.cisse.info/pdf/2014/2014%20CAE%20Knowle…

Criteria Non-performance Basic Proficient Distinguished
Describe the typical components of a modern network that contain an access control process.
Does not describe the typical components of a modern network that contain an access control process. Describes incompletely or inaccurately the typical components of a modern network that contain an access control process. Describes the typical components of a modern network that contain an access control process. Describes the typical components of a modern network that contain an access control process, including the use of supporting examples.
Describe the various forms of operating systems that are components of a modern network.
Does not describe the various forms of operating systems that are components of a modern network. Describes incompletely or inaccurately the various forms of operating systems that are components of a modern network. Describes the various forms of operating systems that are components of a modern network. Describes the various forms of operating systems that are components of a modern network, including the use of supporting examples.
Explain the role that virtual and real memory play in the overall security profile of an operating system.
Does not explain the role that virtual and real memory play in the overall security profile of an operating system. Explains incompletely or inaccurately the role that virtual and real memory play in the overall security profile of an operating system. Explains the role that virtual and real memory play in the overall security profile of an operating system. Explains the role that virtual and real memory play in the overall security profile of an operating system, including the use of supporting examples.
Discuss the role of cloud computing and virtualization in operating system security.
Does not discuss the role of cloud computing and virtualization in operating system security. Discusses incompletely or inaccurately the role of cloud computing and virtualization in operating system security. Discusses the role of cloud computing and virtualization in operating system security. Discusses the role of cloud computing and virtualization in operating system security, including the use of supporting examples.
Explain how operating system and application security impact the overall security of modern networks.
Does not explain how operating system and application security impact the overall security of modern networks. Explains incompletely or inaccurately how operating system and application security impact the overall security of modern networks. Explains how operating system and application security impact the overall security of modern networks. Explains how operating system and application security impact the overall security of modern networks, including the use of supporting examples
Describe the role of the hypervisor in operating system security.
Does not describe the role of the hypervisor in operating system security. Describes incompletely or inaccurately the role of the hypervisor in operating system security. Describes the role of the hypervisor in operating system security. Describe the role of the hypervisor in operating system security, including the use of supporting examples.
Describe the implications of public versus private clouds in operating system security.
Does not describe the implications of public versus private clouds in operating system security. Describes incompletely or inaccurately the implications of public versus private clouds in operating system security. Describes the implications of public versus private clouds in operating system security. Describes the implications of public versus private clouds in operating system security, including the use of supporting examples.
Explain the role that the command line interface can play in the overall security profile of an operating system.
Does not explain the role that the command line interface can play in the overall security profile of an operating system. Explains incompletely or inaccurately the role that the command line interface can play in the overall security profile of an operating system. Explains the role that the command line interface can play in the overall security profile of an operating system. Explains the role that the command line interface can play in the overall security profile of an operating system, including the use of supporting examples.
Explain how operating system and application security impact the overall security of modern networks
Does not explain how operating system and application security impact the overall security of modern networks. Explains incompletely or inaccurately how operating system and application security impact the overall security of modern networks. Explains how operating system and application security impact the overall security of modern networks. Explains how operating system and application security impact the overall security of modern networks, including the use of supporting examples.
#write essay #research paper #blog writing #article writing #academic writer #reflective paper #essay pro #types of essays #write my essay #reflective essay #paper writer #essay writing service #essay writer free #essay helper #write my paper #assignment writer #write my essay for me #write an essay for me #uk essay #thesis writer #dissertation writing services #writing a research paper #academic essay #dissertation help #easy essay #do my essay #paper writing service #buy essay #essay writing help #essay service #dissertation writing #online essay writer #write my paper for me #types of essay writing #essay writing website #write my essay for free #reflective report #type my essay #thesis writing services #write paper for me #research paper writing service #essay paper #professional essay writers #write my essay online #essay help online #write my research paper #dissertation writing help #websites that write papers for you for free #write my essay for me cheap #pay someone to write my paper #pay someone to write my research paper #Essaywriting #Academicwriting #Assignmenthelp #Nursingassignment #Nursinghomework #Psychologyassignment #Physicsassignment #Philosophyassignment #Religionassignment #History #Writing #writingtips #Students #universityassignment #onlinewriting #savvyessaywriters #onlineprowriters #assignmentcollection #excelsiorwriters #writinghub #study #exclusivewritings #myassignmentgeek #expertwriters #art #transcription #grammer #college #highschool #StudentsHelpingStudents #studentshirt #StudentShoe #StudentShoes #studentshoponline #studentshopping #studentshouse #StudentShoutout #studentshowcase2017 #StudentsHub #studentsieuczy #StudentsIn #studentsinberlin #studentsinbusiness #StudentsInDubai #studentsininternational