Question: 1. List the basic steps in securing an operating system. Assume that the O.S. is being installed for the first time on new hardware. 2:
1. List the basic steps in securing an operating system. Assume that the O.S. is being installed for the first time on new hardware.
2: Causes of buffer overflow vulnerabilities are well-known, as are mechanisms for preventing them. Even so, buffer overflow attack succeed in the 21st century.
Name and describe two reasons why buffer overflow vulnerabilities still exist. Name and describe one method of preventing buffer overflow vulnerabilities.
3: Explain the function of the trusted boot function of the trusted platform module (TPM.) Tell how that is related to the earlier controversy between Apple and the FBI concerning iPhone encryption. What could the FBI do in the absence of a trusted boot function?
4: Define single loss exposure and annualized risk of occurrence. Explain in your own words what these have to do with computer security.
5: Explain why it is important to monitor outbound traffic as well as inbound traffic in a corporate network. Give an example that illustrates the importance of monitoring outbound traffic. (The example may be contrived or hypothetical.)
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
