Advantages and Disadvantages of at Least Three Different

Submitted by: Submitted by

Views: 770

Words: 3895

Pages: 16

Category: Business and Industry

Date Submitted: 06/21/2013 03:38 PM

Report This Essay

Advantages and Disadvantages of at Least Three Different

Measures Use to Protect Operating Systems

University Maryland University College

Advantages and Disadvantages of at Least Three Different

Measures Use to Protect Operating Systems

Most developed operating systems provide and require security through trusted software applications, access controls, and security management. This paper will provide an overview and description of operating systems and trusted systems. There are three mechanisms (software, access control, and intrusion systems) for operating systems to be measured, reviewed, and discussed for the purpose of this research I’ll address the advantages and disadvantages of the operating system measures. It was also address the implementation and issues security management has to face within each measure. Finally, using the Zeltser security metrics all measures will be ranked accordingly.

One of the most critical parts of an organization is their operational systems. These organizations must comply with system security regulations to include, but not limited to the Health Insurance Portability and Accountability Act, Federal Information Security Management Act, and Sarbanes-Oxley Act. According to Bassil, an operating system is a collection of software programs whose role is to manage computer resources and provide an interface for client applications to interact with the different computer hardware (2012). In short, the operational system manages all of the software and hardware on the computer. Therefore, without an operating system a computer is just a paper weight. Many organizations are connecting their operational systems to the World Wide Web and require protection against unauthorized events. An organization’s operational system may be subject to vulnerabilities, which can cause significant damage to the data and its applications. According to Heidari, operating system security revolves around the appropriate...