Nobody downloaded yet

Project Paper: Operating Systems: Hardening and Security - Research Proposal Example

Comments (0) Cite this document
Summary
Operating Systems: Hardening and Security Course Operating Systems: Hardening and Security Introduction NextGard technologies specialize in a number of network consulting services and are as a result faced with a number of network security vulnerabilities and risks…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful
Project Paper: Operating Systems: Hardening and Security
Read TextPreview

Extract of sample
"Project Paper: Operating Systems: Hardening and Security"

Download file to see previous pages With regard to the nature of services offered by the company, ensuring information security is critically important as it will not only protect the organization from risks and threats of malicious access but will also enhance the reliability and confidentiality of the company’s current network system. To upgrade its current network into a secure system, NextGard technologies will have to implement a number of policies and guidelines. As a Security professional hired by NextGard technologies to help provide their windows security implementation model for their organization, I will recommend a number of changes in the organization’s current network system some of which include the adoption of appropriate Microsoft Windows access controls, use of cryptography methods as well as a number of prevention techniques and countermeasures for thwarting the risks posed by malicious codes such as worms, viruses and Trojan horses among other related malicious codes. Windows access control is particularly an integral component of the entire network security used by NextGard technologies and it directly affects the organizations information security, Integrity, confidentiality and availability. ...
rols The fact that all employees at NextGard technologies have internet access and are free to browse the web significantly increase the vulnerability of the organizations network system to the risks of malicious access by exposing its information to a number of serious security threats. According to Microsoft Corporation (2005), Microsoft windows access controls is a collection of security management technologies that can be used by organizations like NextGard technologies to access various management solutions as well as mitigate the information security vulnerabilities and threats to their network system. Throughout its district offices in five countries, NextGard technologies uses a mix of computers running on various versions of windows such as Windows 2000, XP, Vista and Windows 7. Access controls are not used to effectively protect an organizations information system from unauthorized access but are also important in the facilitation of legitimate and seamless utilization of the information technology resources. The three main tenets of Microsoft access controls include Authentication, authorization as well as accounting. In the context of organizational information security of NextGard technologies, the organization should upgrade its current network security through a number of authentication techniques. Authentication simply refers to the process of verifying the users accessing the network of the organization to prevent unauthorized access. This can particularly be achieved through implementing a number of strategies such as the use of passwords, digital certificates, biometrics and smart cards when logging onto the organizations network. To improve the security of its networks across all its five district offices, the organization should implement strong ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Project Paper: Operating Systems: Hardening and Security Research Proposal”, n.d.)
Project Paper: Operating Systems: Hardening and Security Research Proposal. Retrieved from https://studentshare.org/information-technology/1469589-project-paper-operating-systems-hardening-and
(Project Paper: Operating Systems: Hardening and Security Research Proposal)
Project Paper: Operating Systems: Hardening and Security Research Proposal. https://studentshare.org/information-technology/1469589-project-paper-operating-systems-hardening-and.
“Project Paper: Operating Systems: Hardening and Security Research Proposal”, n.d. https://studentshare.org/information-technology/1469589-project-paper-operating-systems-hardening-and.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Network Security & Applications
Additionally, at present a lot of people get chances to work from home and connect to systems distantly, in this regard network security becomes a significant subject for the companies. In this regard, the most excellent way to keep away from inconsequential security issues and threats is that education of end-user though the right software can help diminish the threat.
1 Pages(250 words)Research Proposal
Information Security in Supply Chain Security
They play crucial part in determining the relationships among the various actors that are involved in the chains. Security in a supply chain has always been an important aspect. Ever since the supply chains have become technology dependent, the security aspect has faced significant impact from the ‘information security’ aspect.
5 Pages(1250 words)Research Proposal
Privacy-Enhancing Security Mechanisms
The major concern of every person is that the data should reach the desired person properly. There exist many privacy enhancing security mechanisms that ensure secure delivery of data to the intended location. Effective programming is the key towards design of efficient privacy enhancing mechanisms.
3 Pages(750 words)Research Proposal
Information Security
Even a small business organization needs to deal with huge volume of confidential and sensitive information. Evidently, unauthorized access to such information would hurt the stakeholder interests and thereby the firm’s reputation. Therefore, advanced information security measures are vital for even the smallest business organizations.
3 Pages(750 words)Research Proposal
Project Proposal for Research Paper
Computer crime (commonly referred to as cybercrime) is a reference to any type of criminal activity that involves the use of a computer or an internal/external network. This type of activity has been increasing at alarming rates over the past few decades, to the point that seemingly no one is immune from becoming a victim (Dearne, 2002, p.
7 Pages(1750 words)Research Proposal
INFORNO operating system
In the process an Operating System performs a range of activities such as code conversion, memory allocation, interprocess communication, security enforcement and display. This paper aims at describing one such Operating System: INFERNO OS. INFERNO is an Operating System designed for building distributed systems on a network of varied computer systems.
6 Pages(1500 words)Research Proposal
Managing Email Security in Organizations
To protect organization information it is necessary to select and implement proper and up to date security control measures. (Department of Defense, 2000). These measures include the management, technical, operations and counter measures undertaken to enhance the protection of a companies information systems.
6 Pages(1500 words)Research Proposal
Complex Systems and Decision Making
However, in urban areas of the eastern, western and most particularly in developing countries, major blackout continued to be a serious problem that virtually cause paralysis in the communities. Moreover, bad weather, natural disasters, human errors, technical failures, terrorism and other acts of war could also cause technical infrastructures disturbances; but of the aforementioned, weather is the common reason for the widespread and long lasting electric power system blackouts.
3 Pages(750 words)Research Proposal
Project paper and Feasibility Paper
The primary dependent variable is underage drinking which is caused by the teenagers’ desire for social acceptance, their psychological problems, poor family environments and their natural curiosity to try new things, all of which leads them to
2 Pages(500 words)Research Proposal
Information Systems Project ,, application design
Referred to as globalization, the exchange of culture and the provision of products and services to different types of customers merits the
2 Pages(500 words)Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Research Proposal on topic Project Paper: Operating Systems: Hardening and Security for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us