Question: We know operating systems are vulnerable. Poor coding leads to bugs that attackers can exploit. Users often opt for convenience over security and modify or

We know operating systems are vulnerable. Poor coding leads to bugs that attackers can exploit. Users often opt for convenience over security and modify or disable built-in security features.
Have you ever put off installing security updates? Or disabled the requirement for a password to log into an operating system?
Starting in this module and continuing each week through the module for Week 6, you will be responsible for submitting a written report that examines the security of a specific operating system.
This week, in a well-written report, describe the security features that are available in the Windows operating system, and how they can be used to safeguard systems and data from cyberattacks. While the list below should not be considered definitive, you might find it helpful to get you thinking about the features you should consider including in your report:
virus and threat protection
account protection
firewall and network protection
application and browser controls
data protection

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!