Nobody downloaded yet

Network Operating Systems and Security BEng - Assignment Example

Comments (0) Cite this document
Summary
1 Network Security Due to recurrent technological developments, information and communication technology frequently diverts in new dimensions. The research and development in the context of information and communication technology is very effective. Moreover, the new and advanced form of technology has also facilitated vulnerabilities and threats to be more intelligent…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
Network Operating Systems and Security BEng
Read TextPreview

Extract of sample "Network Operating Systems and Security BEng"

Download file to see previous pages In the context of network security definition, it consists of concerns related to network communication privacy, confidentiality of data over the network, accessing unauthorized classified data, access to prohibited network domains and utilizing Internet for concealed communication (Network Security. 2007). The security predictions that were published in an article for the year 2010 incorporates new advanced threats named as advanced persistent threats (APT), Cyber war escalates, VoIP attacks, Perimeter shrinks and harden, social networking sites, malware, DLP for intellectual property protection and malware as a service (MaaS) (Watchguard Unveils Top 10 Security Predictions for 2011. 2011). In order to protect the computer network, organizations emphasize on implementing hardware and software application as well as a security policy. This policy is followed by constructing a security policy document that defines rules and procedures. A typical security policy is constructed on a set of rules that defines authorization and access of network resources of an organization (, what is security policy? definition and meaning).The aim of implementing these security policies is to establish rules and procedures for improper use of network services. Moreover, the objective is to create a framework that will assist in identification and prevention of unauthorized access of network services (, Network Security Policy). Network security issues can lead to many different aspects. For example, if the server containing customer data is breached, organization will lose its credibility and trust among the customer and that will result in business loss. Similarly, if a critical system is hacked by internal or external sources, organization’s financial data along with goals and objectives can be revealed to other competitors. In order to eliminate the threats including unauthorized access, viruses, Trojans, malware and malicious codes, a security policy document is required. The document will provide a consistent framework to secure the integrity of the network along with eliminating risk abided by security threats and vulnerabilities. 2 Risk Assessment Risk assessment is a process to evaluate risks associated with threats and vulnerabilities to the network. Three factors will be considered in this scenario i.e. Assets, Threats and Security Priority Identification. 2.1 Assets The identification of information assets is vital before conducting risk assessment. Information assets are defined as the entities that hold organization data. A good definition is available on ‘www.ibm.com’ which states it as, “information assets are specific to your business functions and business strategies, they may be contained within broad categories such as contractual and legislative compliance, those needing virus prevention, those critical to business recovery following security compromises, etc.” The information assets for an organization will be technology assets, data asset, service asset and people asset. In case of educational establishment the assets that need to be prioritized are: file space server, Linux web server, finance server, student database and email server. 2.2 Threats Threats are defined as ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Operating Systems and Security BEng Assignment”, n.d.)
Retrieved from https://studentshare.org/family-consumer-science/1420762-network-operating-systems-and-security-beng
(Network Operating Systems and Security BEng Assignment)
https://studentshare.org/family-consumer-science/1420762-network-operating-systems-and-security-beng.
“Network Operating Systems and Security BEng Assignment”, n.d. https://studentshare.org/family-consumer-science/1420762-network-operating-systems-and-security-beng.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Network Operating Systems and Security BEng

Network Operating Systems

...in a simplest of methods along with configuring an FTP site or server. FreeBSD also includes FTP server software named as ‘ftpd’, that is located in the base system. ‘ftdp’ enables the network administrator to configure FTP server in a simple way (, File Transfer Protocol (FTP) ).However, Linux uses ‘scp’ to share files on a remote location. Command for copying files from a local workstation to a remote workstation is as follows (, Using scp to transfer files in Linux): ‘scp (file name) user@host.domain:path’ File name identifies the file that needs to be copied. User is the username on the remote workstation Host.domain is the Internet address of the remote workstation Path identifies the specific...
2 Pages(500 words)Coursework

Project Paper: Operating Systems: Hardening and Security

...? Operating Systems: Hardening and Security Operating Systems: Hardening andSecurity Introduction NextGard technologies specialize in a number of network consulting services and are as a result faced with a number of network security vulnerabilities and risks. Consequently one of their priorities is to upgrade their current network into a secure system. With nearly 250 employees in 5 countries, the organization currently faces a number of security challenges. The vulnerability of NextGard technologies is further increased by the fact that...
8 Pages(2000 words)Research Proposal

Operating Systems

...Investigation of How Memory Is Implemented In a Modern Operating System Such As WindowsXP Microsoft Corporation recommends that computers running Windows XP have at least 128 megabytes (MB) of Random Access Memory (RAM) installed. For this memory size, Windows XP has shown itself to be consistently superior to previous versions of Windows. Performance only gets better with additional resources, particularly when you run memory-intensive multimedia applications. Many users will want to expand their computer's memory to take advantage of multimedia applications and to achieve even better performance. In general, adding memory is the easiest and most effective way to improve a computer's performance....
4 Pages(1000 words)Essay

Network operating systems

...1. What can you tell from the article about what differentiates Novell's approach to network operating systems from that of its competitors The maincompetitor of Novell on network operating systems market is Microsoft. While Microsoft had begun from desktop operating systems, such as DOS and Windows 3.0, Novell was initially oriented at network operating systems. But later, when Microsoft successfully entered network operating systems market with its Windows for Workgroups and WindowsNT, Novell attempted...
3 Pages(750 words)Essay

Operating Systems and Security

...Topic: Operating systems and security Pre-brief 8th February Shell Program 1. Introduction Shell is a command interpreter that providesUNIX users with an interface to the operating system and is usually referred to as Command Line interpreter (CLI). It interprets user commands and executes them as independent processes. Shell also allows users to code an interpretive script and group them together using simple programming constructs such as if, while and for. This is achieved by writing a shell script which is a set of commands in a file that is executed as a single command. Shell scripting also gives users the freedom to coordinate a scenarios of...
5 Pages(1250 words)Essay

Operating Systems

...to processor Terminated: Process has completed its execution Figure 1 Process States Diagram 3. Process Control Block The operating system maintains a Process Control Block (PCB) for every process. It contains the following information related to a process: Process State: Indicates whether process is ready, running, waiting, etc. Program Counter: Depicts address of next instruction to be executed. CPU registers: Includes accumulators, index registers, stack pointers, condition codes, state registers (for interrupts, etc.), etc. CPU Scheduling Information: depicts priority, position in queue, etc. Memory Management Information: contains vales of base and limit registers, page/segment tables,...
6 Pages(1500 words)Research Paper

Operating Systems

...the security server of DCE, network authentication services, OCEP, and Enterprise Industry Mapping (EIM) (IBM Corporation, 2010). Multiprocessor Operating Systems The multiprocessing operating system allows the multiple users to run and execute multiple programs by utilizing the single central processing units at a same time. As far as the multiprocessor operating systems are concerned, these are regular operating systems capable of utilizing multiple processors for multiple processes running and executing at a same time. Moreover, these operating...
7 Pages(1750 words)Research Paper

Operating Systems

...Operating Systems The two sections that important for this discussion are the Linux I/O and Windows I/O. The Linux I/O service mainly offers the tools used for program profiling and monitoring the performance of the computer CPU. Disk scheduling in Linux allows the execution of many program processes at the same time. The Linux Page Cache aids in fast data access and transmission. This is because during an I/O operation, such as disk read information, the operating system kernel checks for data in the page cache to facilitate fast reading of the data. The advancements in the Linux I/O services is the optimization of disk scheduling through the use of...
1 Pages(250 words)Essay

Operating Systems

...Operating Systems al Affiliation Operating Systems Windows 10 Unix/Linux (Linux Kernel 4 MacOS (El Capitan) Scalability Windows 8 has the best scalability compared to the tow other version. It supports several hardware and components (1/3) A great number of hardware does not support it and this affects its scalability. This has greatly affected its application in some operating environments (3/3) Although it is an improvement of earlier versions, its scalability still falls below Windows (2/3) Ease of Use Out of the three operating systems, Windows 10 is the easiest to use (1/3) It is Complicated and many people may...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Network Operating Systems and Security BEng for FREE!

Contact Us