Nobody downloaded yet

Project Paper: Operating Systems: Hardening and Security - Research Proposal Example

Comments (0) Cite this document
Operating Systems: Hardening and Security Course Operating Systems: Hardening and Security Introduction NextGard technologies specialize in a number of network consulting services and are as a result faced with a number of network security vulnerabilities and risks…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Project Paper: Operating Systems: Hardening and Security
Read TextPreview

Extract of sample "Project Paper: Operating Systems: Hardening and Security"

Download file to see previous pages With regard to the nature of services offered by the company, ensuring information security is critically important as it will not only protect the organization from risks and threats of malicious access but will also enhance the reliability and confidentiality of the company’s current network system. To upgrade its current network into a secure system, NextGard technologies will have to implement a number of policies and guidelines. As a Security professional hired by NextGard technologies to help provide their windows security implementation model for their organization, I will recommend a number of changes in the organization’s current network system some of which include the adoption of appropriate Microsoft Windows access controls, use of cryptography methods as well as a number of prevention techniques and countermeasures for thwarting the risks posed by malicious codes such as worms, viruses and Trojan horses among other related malicious codes. Windows access control is particularly an integral component of the entire network security used by NextGard technologies and it directly affects the organizations information security, Integrity, confidentiality and availability. ...
rols The fact that all employees at NextGard technologies have internet access and are free to browse the web significantly increase the vulnerability of the organizations network system to the risks of malicious access by exposing its information to a number of serious security threats. According to Microsoft Corporation (2005), Microsoft windows access controls is a collection of security management technologies that can be used by organizations like NextGard technologies to access various management solutions as well as mitigate the information security vulnerabilities and threats to their network system. Throughout its district offices in five countries, NextGard technologies uses a mix of computers running on various versions of windows such as Windows 2000, XP, Vista and Windows 7. Access controls are not used to effectively protect an organizations information system from unauthorized access but are also important in the facilitation of legitimate and seamless utilization of the information technology resources. The three main tenets of Microsoft access controls include Authentication, authorization as well as accounting. In the context of organizational information security of NextGard technologies, the organization should upgrade its current network security through a number of authentication techniques. Authentication simply refers to the process of verifying the users accessing the network of the organization to prevent unauthorized access. This can particularly be achieved through implementing a number of strategies such as the use of passwords, digital certificates, biometrics and smart cards when logging onto the organizations network. To improve the security of its networks across all its five district offices, the organization should implement strong ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Project Paper: Operating Systems: Hardening and Security Research Proposal”, n.d.)
Project Paper: Operating Systems: Hardening and Security Research Proposal. Retrieved from
(Project Paper: Operating Systems: Hardening and Security Research Proposal)
Project Paper: Operating Systems: Hardening and Security Research Proposal.
“Project Paper: Operating Systems: Hardening and Security Research Proposal”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Project Paper: Operating Systems: Hardening and Security

Network Operating Systems and Security BEng

...basis. For instance, to secure data related to finance department, backup finance server will be deployed to synchronize data on small intervals. Disk mirroring techniques can also be employed. Disk mirroring is defined as “The recording of redundant data for fault tolerant operation. Data are written on two partitions of the same disk or on two separate disks within the same system. Disk mirroring uses the same controller. RAID 1 provides mirroring, which was first accomplished only with SCSI drives, but later with ATA (IDE) drives” (Disk Mirroring. 2011). However, RAID controllers are implemented in the process. A comprehensive definition of RAID is available in the network dictionary...
9 Pages(2250 words)Assignment

Operating Systems

...Investigation of How Memory Is Implemented In a Modern Operating System Such As WindowsXP Microsoft Corporation recommends that computers running Windows XP have at least 128 megabytes (MB) of Random Access Memory (RAM) installed. For this memory size, Windows XP has shown itself to be consistently superior to previous versions of Windows. Performance only gets better with additional resources, particularly when you run memory-intensive multimedia applications. Many users will want to expand their computer's memory to take advantage of multimedia applications and to achieve even better performance. In general, adding memory is the easiest and most effective way to improve a computer's performance....
4 Pages(1000 words)Essay

Operating Systems

...corporation to reach the market status, a decade’s long investment must be made. The other major development of the decade can certainly be the UNIX/Linux story. The fact that several software products in the market today depend on the two systems contributes to the idea that their application has midwifed the dramatic advancements in the computing age. In fact, the microprocessor success at Apple heralded by Mac OS is a build-up of the parent UNIX operating system. Windows continued success is evident in the latest development of the release of Windows 7 Service Pack 1 this year. It is can be projected that the future of OS evolution is in safe hands, having been...
3 Pages(750 words)Term Paper

Operating Systems

...Introduction Software available today is highly advanced and can perform varied and complicated activities. However, it has taken many years to achieve this. The following report highlights the major achievements that have been recognized in the evolution of the operating system. Seven great achievements in the evolution of the Operating systems 1. Batch system (1955-1960s) This was used in earlier days when there were no operating systems. Each user used the machine for a specific period of time with his program and data. There was the loading of a program into the machine and data was worked on until the program...
3 Pages(750 words)Term Paper

Operating Systems and Security

...Topic: Operating systems and security Pre-brief 8th February Shell Program 1. Introduction Shell is a command interpreter that providesUNIX users with an interface to the operating system and is usually referred to as Command Line interpreter (CLI). It interprets user commands and executes them as independent processes. Shell also allows users to code an interpretive script and group them together using simple programming constructs such as if, while and for. This is achieved by writing a shell script which is a set of commands in a file that is executed as a single command. Shell scripting also gives users the freedom to coordinate a scenarios of...
5 Pages(1250 words)Essay

Operating Systems processor Terminated: Process has completed its execution Figure 1 Process States Diagram 3. Process Control Block The operating system maintains a Process Control Block (PCB) for every process. It contains the following information related to a process: Process State: Indicates whether process is ready, running, waiting, etc. Program Counter: Depicts address of next instruction to be executed. CPU registers: Includes accumulators, index registers, stack pointers, condition codes, state registers (for interrupts, etc.), etc. CPU Scheduling Information: depicts priority, position in queue, etc. Memory Management Information: contains vales of base and limit registers, page/segment tables,...
6 Pages(1500 words)Research Paper

Technical Project Paper: Information Systems Security

...information systems have failed to meet the desired security standards and protocols defined by IT compliance rules and regulations. The information systems are exposed to widespread risks, threats and vulnerabilities that can adversely impact the IT work processes. Risks reflect the possibility of data loss, failure to comply with IT rules and regulations, or loss of clients on account of ineffective work practices. Threats can result in potential damages to the system through virus attacks or malicious codes that corrupt data. Vulnerability indicates the potential weaknesses of the system and its impact on the system...
10 Pages(2500 words)Term Paper

Operating Systems

.... There are several and diverse components of an operating system that include but not limited to the file management, security, memory and process management. It is worthwhile to compare each operating system to evaluate and assess the above given components of an operating system. The following paragraphs present the comparison of basic operating systems with respect to the above given features (Solomon, Russinovich & Polze, 2006). File Management The file management system refers to the organization, management and manipulation of computer data in documents and files...
7 Pages(1750 words)Research Paper

Operating Systems

...Operating Systems The two sections that important for this discussion are the Linux I/O and Windows I/O. The Linux I/O service mainly offers the tools used for program profiling and monitoring the performance of the computer CPU. Disk scheduling in Linux allows the execution of many program processes at the same time. The Linux Page Cache aids in fast data access and transmission. This is because during an I/O operation, such as disk read information, the operating system kernel checks for data in the page cache to facilitate fast reading of the data. The advancements in the Linux I/O services is the optimization of disk scheduling through the use of...
1 Pages(250 words)Essay

Operating Systems

...Operating Systems al Affiliation Operating Systems Windows 10 Unix/Linux (Linux Kernel 4 MacOS (El Capitan) Scalability Windows 8 has the best scalability compared to the tow other version. It supports several hardware and components (1/3) A great number of hardware does not support it and this affects its scalability. This has greatly affected its application in some operating environments (3/3) Although it is an improvement of earlier versions, its scalability still falls below Windows (2/3) Ease of Use Out of the three operating systems, Windows 10 is the easiest to use (1/3) It is Complicated and many people may...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Proposal on topic Project Paper: Operating Systems: Hardening and Security for FREE!

Contact Us