Question: 1. List the basic steps in securing an operating system. Assume that the O.S. is being installed for the first time on new hardware. 2:

1. List the basic steps in securing an operating system. Assume that the O.S. is being installed for the first time on new hardware.

2: Causes of buffer overflow vulnerabilities are well-known, as are mechanisms for preventing them. Even so, buffer overflow attack succeed in the 21st century.

Name and describe two reasons why buffer overflow vulnerabilities still exist. Name and describe one method of preventing buffer overflow vulnerabilities.

3: Explain the function of the trusted boot function of the trusted platform module (TPM.) Tell how that is related to the earlier controversy between Apple and the FBI concerning iPhone encryption. What could the FBI do in the absence of a trusted boot function?

4: Define single loss exposure and annualized risk of occurrence. Explain in your own words what these have to do with computer security.

5: Explain why it is important to monitor outbound traffic as well as inbound traffic in a corporate network. Give an example that illustrates the importance of monitoring outbound traffic. (The example may be contrived or hypothetical.)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!