NOS Signature Mitigation

Other

Write 4–6 pages in which you identify the network operating system mitigations available to the company in the case study, which will ensure the selection of the most efficient and secure technology to run the business owner’s new venture.

    • Explain the concept of system services and how they contribute to the overall security profile of an operating system.
    • Explain the security benefits available through domain separation, process isolation, resource encapsulation, and least privilege.
    • Describe controls that mitigate operating system threats and vulnerabilities.
    • Explain the role of operating system updates and patches as a security control.
    • Describe how the operating system achieves separation of domain, processes, and resources.
    • Explain the concept of least privilege as a function of operating system and application configuration and management.
    • Describe how an operating system defends itself against attacks.
    • Describe controls necessary to defend against network and network operating system vulnerabilities.

    Additional Requirements

    • Written communication: Written communication is free of errors that detract from the overall message.
    • APA formatting: Use current APA style and formatting guidelines.
    • Length: 4–6 pages, excluding the references page.
    • Font and font size: Times New Roman, 12 point.

    NOS Signature Mitigations Scoring Guide

    NOS Signature Mitigations Scoring Guide Grading Rubric
    Criteria Non-performance Basic Proficient Distinguished
    Explain the concept of system services and how they contribute to the overall security profile of an operating system.
    Does not explain the concept of system services and how they contribute to the overall security profile of an operating system. Explains incompletely or inaccurately the concept of system services and how they contribute to the overall security profile of an operating system. Explains the concept of system services and how they contribute to the overall security profile of an operating system. Explains the concept of system services and how they contribute to the overall security profile of an operating system, including the use of supporting examples.
    Explain the security benefits available through domain separation, process isolation, resource encapsulation, and least privilege.
    Does not explain the security benefits available through domain separation, process isolation, resource encapsulation, and least privilege. Explains incompletely or inaccurately the security benefits available through domain separation, process isolation, resource encapsulation, and least privilege. Explains the security benefits available through domain separation, process isolation, resource encapsulation, and least privilege. Explains the security benefits available through domain separation, process isolation, resource encapsulation, and least privilege, including the use of supporting examples.
    Describe controls that mitigate operating system threats and vulnerabilities.
    Does not describe controls that mitigate operating system threats and vulnerabilities. Describes incompletely or inaccurately controls that mitigate operating system threats and vulnerabilities. Describes controls that mitigate operating system threats and vulnerabilities. Describes controls that mitigate operating system threats and vulnerabilities, including the use of supporting examples.
    Explain the role of operating system updates and patches as a security control.
    Does not explain the role of operating system updates and patches as a security control. Explains incompletely or inaccurately the role of operating system updates and patches as a security control. Explains the role of operating system updates and patches as a security control. Explains the role of operating system updates and patches as a security control, including the use of supporting examples.
    Describe how the operating system achieves separation of domain, processes, and resources.
    Does not describe how the operating system achieves separation of domain, processes, and resources. Describes incompletely or inaccurately how the operating system achieves separation of domain, processes, and resources. Describes how the operating system achieves separation of domain, processes, and resources. Describes how the operating system achieves separation of domain, processes, and resources, including the use of supporting examples.
    Explain the concept of least privilege as a function of operating system and application configuration and management.
    Does not explain the concept of least privilege as a function of operating system and application configuration and management. Explains incompletely or inaccurately the concept of least privilege as a function of operating system and application configuration and management. Explains the concept of least privilege as a function of operating system and application configuration and management. Explains the concept of least privilege as a function of operating system and application configuration and management, including the use of supporting examples.
    Describe how an operating system defends itself against attacks.
    Does not describe how an operating system defends itself against attacks. Describes incompletely or inaccurately how an operating system defends itself against attacks. Describes how an operating system defends itself against attacks. Describes how an operating system defends itself against attacks, including the use of supporting examples.
    Describe controls necessary to defend against network and network operating system vulnerabilities.
    Does not describe controls necessary to defend against network and network operating system vulnerabilities. Describes, incompletely or inaccurately, controls necessary to defend against network and network operating system vulnerabilities. Describes controls necessary to defend against network and network operating system vulnerabilities. Describes controls necessary to defend against network and network operating system vulnerabilities, including the use of supporting examples.
    Exhibits proficiency in writing and use of APA style and format.
    Does not exhibit proficiency in writing and use APA style and format. Exhibits a low level of proficiency in writing and use of APA style and format. Exhibits proficiency in writing and use of APA style and format. Exhibits a high level of proficiency in writing and use of APA style and format.

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *