Network Operating System and Application Security
-
Deliverable
Write 6–8 pages describing the primary network components that should be considered as part of an IT solution that supports the business detailed in the case study:
- Describe the typical components of a modern network that contain an access control process.
- Describe the various forms of operating systems that are components of a modern network, including:
- Memory (real, virtual, and management).
- Object based versus object oriented.
- Privileged and non-privileged states.
- Processes and threads, along with their management (National Centers of Academic Excellence in Information Assurance/Cyber Defense, 2013).
- Explain the role that virtual and real memory play in the overall security profile of an operating system.
- Discuss the role of cloud computing and virtualization in operating system security.
- Explain how operating system and application security impact the overall security of modern, including:
- DMZs and proxy servers.
- Honeypots and honeynets.
- Firewalls and VPNs.
- IDS/IPS.
- Network devices (routers, switches, VPNs, and firewalls).
- Workstations.
- Mobile devices.
- Peripheral devices.
- Describe the role of the hypervisor in operating system security.
- Describe the implications of public versus private clouds in operating system security.
- Explain the role that the command line interface can play in the overall security profile of an operating system.
- Explain how operating system and application security impact the overall security of modern networks.
Additional Requirements
- Written communication: Written communication is free of errors that detract from the overall message.
- APA formatting: Use current APA style and formatting guidelines.
- Length: 6–8 pages, excluding the references page.
- Font and font size: Times New Roman, 12 point.
Reference
National Centers of Academic Excellence in Information Assurance/Cyber Defense (IA/CD). (2013). CAE knowledge units. Retrieved from http://www.cisse.info/pdf/2014/2014%20CAE%20Knowle…
Criteria | Non-performance | Basic | Proficient | Distinguished |
---|---|---|---|---|
Describe the typical components of a modern network that contain an access control process. |
Does not describe the typical components of a modern network that contain an access control process. | Describes incompletely or inaccurately the typical components of a modern network that contain an access control process. | Describes the typical components of a modern network that contain an access control process. | Describes the typical components of a modern network that contain an access control process, including the use of supporting examples. |
Describe the various forms of operating systems that are components of a modern network. |
Does not describe the various forms of operating systems that are components of a modern network. | Describes incompletely or inaccurately the various forms of operating systems that are components of a modern network. | Describes the various forms of operating systems that are components of a modern network. | Describes the various forms of operating systems that are components of a modern network, including the use of supporting examples. |
Explain the role that virtual and real memory play in the overall security profile of an operating system. |
Does not explain the role that virtual and real memory play in the overall security profile of an operating system. | Explains incompletely or inaccurately the role that virtual and real memory play in the overall security profile of an operating system. | Explains the role that virtual and real memory play in the overall security profile of an operating system. | Explains the role that virtual and real memory play in the overall security profile of an operating system, including the use of supporting examples. |
Discuss the role of cloud computing and virtualization in operating system security. |
Does not discuss the role of cloud computing and virtualization in operating system security. | Discusses incompletely or inaccurately the role of cloud computing and virtualization in operating system security. | Discusses the role of cloud computing and virtualization in operating system security. | Discusses the role of cloud computing and virtualization in operating system security, including the use of supporting examples. |
Explain how operating system and application security impact the overall security of modern networks. |
Does not explain how operating system and application security impact the overall security of modern networks. | Explains incompletely or inaccurately how operating system and application security impact the overall security of modern networks. | Explains how operating system and application security impact the overall security of modern networks. | Explains how operating system and application security impact the overall security of modern networks, including the use of supporting examples |
Describe the role of the hypervisor in operating system security. |
Does not describe the role of the hypervisor in operating system security. | Describes incompletely or inaccurately the role of the hypervisor in operating system security. | Describes the role of the hypervisor in operating system security. | Describe the role of the hypervisor in operating system security, including the use of supporting examples. |
Describe the implications of public versus private clouds in operating system security. |
Does not describe the implications of public versus private clouds in operating system security. | Describes incompletely or inaccurately the implications of public versus private clouds in operating system security. | Describes the implications of public versus private clouds in operating system security. | Describes the implications of public versus private clouds in operating system security, including the use of supporting examples. |
Explain the role that the command line interface can play in the overall security profile of an operating system. |
Does not explain the role that the command line interface can play in the overall security profile of an operating system. | Explains incompletely or inaccurately the role that the command line interface can play in the overall security profile of an operating system. | Explains the role that the command line interface can play in the overall security profile of an operating system. | Explains the role that the command line interface can play in the overall security profile of an operating system, including the use of supporting examples. |
Explain how operating system and application security impact the overall security of modern networks |
Does not explain how operating system and application security impact the overall security of modern networks. | Explains incompletely or inaccurately how operating system and application security impact the overall security of modern networks. | Explains how operating system and application security impact the overall security of modern networks. | Explains how operating system and application security impact the overall security of modern networks, including the use of supporting examples. |