Protection of Operating Systems

Analysis of security measures for protecting operating systems.

Benjamin Fisher
Contributor
4.2
44
30 days ago
Preview (4 of 12)
Sign in to access the full document!
Protection of Operating Systems
Write a paper discussing the relative advantages and disadvantages of at least three different measures
used to protect operating systems. The ease of implementation and the associated security management
issues should also be addressed. Finally, the paper should include a ranking of the measures from best
to worst with supporting rationale.
Protection of Operating Systems
Introduction
The use of computer operating systems has increased significantly across a
range of applications and utilizations within the last few years. These range from
their utilization in all forms of business operation, but also in terms of system
security, and all software applications. User have come to rely on the operating
systems being used as a primary means of accessing both command line interfaces
(CLI) and graphical user interfaces (GUI) which will serve as the way in which
applications and data are accessed as well as providing all of the necessary
information required for ongoing requirements (UMUC, 2011).
Businesses themselves will count on operating systems as a primary means
of addressing and providing the fundamental security elements of:
Confidentiality;
Integrity;
Availability;
Authenticity.
While many operating systems have incorporated a wide range of controls by
which it would be possible to mitigate and address these types of security concerns,
Preview Mode

Sign in to access the full document!

100%

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Document Details

Subject
Information Technology

Related Documents

View all