Question: Topic: Week 1 1 Operating System Security Submission: Five minutes before the end of the tutorial: all files must be uploaded on Moodle. Students should
Topic: Week Operating System Security
Submission: Five minutes before the end of the tutorial: all files must be uploaded on Moodle.
Students should complete and submit the below exercises of this tutorial while their classmates are giving a presentation.
Exercise :
Estimated completion time: minutes
Name five famous malicious software. Then, research about them and explain how they attack and take down their targets?
Exercise :
Estimated completion time: minutes
Find one article or news which published about an intruder. What did you find interesting inside of that article?
Exercise :
Estimated completion time: minutes
You are hired in Professional in IT Pty Ltd as an IT System Manager. The General Manager asked you to prepare a report for a senior management meeting, that what are you going to do and your plan about the IDS and Staff access control on systems and files.
You need to write a concise presentation report with charts and diagrams about your plan. Your report should be about words and presenting that report should not take more than minutes.
Exercise :
Estimated completion time: minutes
Research about some enterpriselevel logging systems for your company which you have hired in the previous question.
Need to have a comparison and good reasons that why you suggest one of those systems and what is the benefit your company will achieve with that system, in the security and managing systems and network.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
