Week 9 Kafle

.docx

School

Webster University *

*We aren’t endorsed by this school

Course

2610

Subject

Information Systems

Date

May 14, 2024

Type

docx

Pages

4

Uploaded by JusticeIbisMaster903 on coursehero.com

Assignment Week 9 Subash Kafle, 24T1FG21 IT 503: Operating Systems Master of Science in Information Technology Washington University of Science and Technology Prof. Dr. Zineb Korachi March 13, 2024
Ans 1: For a system that monitors suspicious behavior, analyzes traffic for threats and provides visibility into security we can use a Network-Based Intrusion Detection System (NIDS). It is like having smart security cameras for our grocery store. It watches for any unusual activity like someone trying to break in and alerts us in real time. Also it keeps track of everything happening inside our store which gives us a warning of potential threats. In simple terms, a NIDS acts as a security guard for our digital network, finding and alerting us from any suspicious activity both inside and outside our store keeping our business safe from cyber threats (Stallings, 2013). Ans 2: To protect attack against operating system we can use: Before turning code into a program, we should analyze it carefully to find and fix any security issues. While making our program we should use tools that can find problems in the code and help us fix them. When writing code we must follow good practices like checking if the information is managing computer memory well or not and handling files carefully to prevent hackers (Vyas, 2020). Ans 3: The basic steps to secure an operating system are as below: a. By updating OS regularly. [3] b. By enabling firewall and network security. [3] c. By installing and updating antivirus software. [3] d. By using strong passwords and encryption. [3] e. By reviewing the permissions and privacy settings [3] Ans 4: For Case 1, I will use the Sensitivity Based Access Control model. It let us see documents only if we have the right clearance level. For example, someone with a secret clearance can not see a top secret document.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help