Submitted by: Submitted by Im2nast4u
Views: 770
Words: 3895
Pages: 16
Category: Business and Industry
Date Submitted: 06/21/2013 03:38 PM
Advantages and Disadvantages of at Least Three Different
Measures Use to Protect Operating Systems
University Maryland University College
Advantages and Disadvantages of at Least Three Different
Measures Use to Protect Operating Systems
Most developed operating systems provide and require security through trusted software applications, access controls, and security management. This paper will provide an overview and description of operating systems and trusted systems. There are three mechanisms (software, access control, and intrusion systems) for operating systems to be measured, reviewed, and discussed for the purpose of this research I’ll address the advantages and disadvantages of the operating system measures. It was also address the implementation and issues security management has to face within each measure. Finally, using the Zeltser security metrics all measures will be ranked accordingly.
One of the most critical parts of an organization is their operational systems. These organizations must comply with system security regulations to include, but not limited to the Health Insurance Portability and Accountability Act, Federal Information Security Management Act, and Sarbanes-Oxley Act. According to Bassil, an operating system is a collection of software programs whose role is to manage computer resources and provide an interface for client applications to interact with the different computer hardware (2012). In short, the operational system manages all of the software and hardware on the computer. Therefore, without an operating system a computer is just a paper weight. Many organizations are connecting their operational systems to the World Wide Web and require protection against unauthorized events. An organization’s operational system may be subject to vulnerabilities, which can cause significant damage to the data and its applications. According to Heidari, operating system security revolves around the appropriate...