Primary Task Response:

Primary Task Response: Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Conduct research using the library and Internet for information about tools for operating system security threat detection.

Don't use plagiarized sources. Get Your Custom Essay on
Primary Task Response:
From as low as $9/Page
Order Essay
  • Based on your research, select 1 of the tools that you found, and describe how the tool provides information that is useful in the detection of potential and actual security breaches.
  • Provide at least 1 example of how the information would be used in a real-life scenario.

week 2 project ( 3-4 ) pages of content

One of the first tasks in the development of operating system security policies is to identify the tools that can be used for the detection and prevention of security threats to the organization’s operating systems. The operating systems form the core of the system operations, and security violations at the operating system-level could compromise every aspect of the system’s and organization’s IT resources.

For this assignment, you will conduct an analysis and selection of tools that would be appropriate for the detection of operating system security threats in the organization’s systems. You will also summarize the strengths and weaknesses of the built-in security of each of the 3 OS categories (UNIX, open source, and Windows) so that you will be able to determine which areas may need additional security support from other tools.

The following are the  project deliverables:

  • Update the Operating Systems Security Policies document title page with a new date and project name.
  • Update the previously completed sections based on the instructor’s feedback.
  • New Content: Security Threat Detection
    • Security Tool Analysis
      • Review and identify at least 3 tools that would be effectively used in the detection and prevention of operating system security threats in the organization’s systems.
      • Include the types of threats that the tools identify.
      • Discuss the total threat coverage for the operating systems provided by these tools.
      • Given that implementation of security tools requires significant investment, management will likely be reluctant to approve them unless the investment can be justified. As part of your analysis, describe why these tools are necessary for the company and how the investment can be justified to management.
    • Built-in Security Analysis
      • Summarize the strengths and weaknesses of the built-in security of each of the 3 major OS categories (UNIX, open source, and Windows).
      • Discuss how the weaknesses can be strengthened using the tools identified in the Security Tool Analysis section.
  • Be sure to update your table of contents before submission.
  • Name the document “yourname_CS652

How to place an order?

Take a few steps to place an order on our site:

  • Fill out the form and state the deadline.
  • Calculate the price of your order and pay for it with your credit card.
  • When the order is placed, we select a suitable writer to complete it based on your requirements.
  • Stay in contact with the writer and discuss vital details of research.
  • Download a preview of the research paper. Satisfied with the outcome? Press “Approve.”

Feel secure when using our service

It's important for every customer to feel safe. Thus, at The Homework Writings, we take care of your security.

Financial security You can safely pay for your order using secure payment systems.
Personal security Any personal information about our customers is private. No other person can get access to it.
Academic security To deliver no-plagiarism samples, we use a specially-designed software to check every finished paper.
Web security This website is protected from illegal breaks. We constantly update our privacy management.

Get assistance with placing your order. Clarify any questions about our services. Contact our support team. They are available 24\7.

Still thinking about where to hire experienced authors and how to boost your grades? Place your order on our website and get help with any paper you need. We’ll meet your expectations.

Order now Get a quote