Operating Systems Vulnerabilities: Mac and Linux Malware vulnerabilities

The audience for your security assessment report (SAR) is the leadership of your organization, which is made up of technical
ou just summarized operating systems and information systems for leadership. In your mind, you can already hear leadership saying “So what?” The organization’s leaders are not well versed in operating systems and the threats and vulnerabilities in operating systems, so in your SAR, you decide to include an explanation of advantages and disadvantages of the different operating systems and their known vulnerabilities.

Prepare by first reviewing the different types of vulnerabilities and intrusions explained in these resources:

Windows vulnerabilities
Linux vulnerabilities
Mac OS vulnerabilities
SQL PL/SQL, XML and other injections

Based on what you gathered from the resources, compose the OS vulnerability section of the SAR. Be sure to:

Explain Windows vulnerabilities and Linux vulnerabilities.
Explain the Mac OS vulnerabilities, and vulnerabilities of mobile devices.
Explain the motives and methods for intrusion of the MS and Linux operating systems;
Explain the types of security awareness technologies such as intrusion detection and intrusion prevention systems.
Describe how and why different corporate and government systems are targets.
Describe different types of intrusions such as SQL PL/SQL, XML, and other injections

You will provide leadership with a brief overview of vulnerabilities in your SARand nontechnical staff. Some of your audience will be unfamiliar with operating systems (OS). As such, you will begin your report with a brief explanation of operating systems fundamentals and the types of information systems.

Click on and read the following resources that provide essential information you need to know before creating a thorough and accurate OS explanation:

operating systems fundamentals
the applications of the OS
The Embedded OS
information system architecture
cloud computing
web architecture

After reviewing the resources, begin drafting the OS overview to incorporate the following:

Explain the user’s role in an OS.
Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
Describe the embedded OS.
Describe how the systems fit in the overall information system architecture, of which cloud computing is an emerging, distributed computing network architecture..
The main focus of the paper will be the Malware vulnerability of Mac and Linux Systems. I have provided some of the sources to be used. If you could include at a minimum 5 peer reviewed sources in addition that would be great.

 

 

 

 

 

 

Sample Solution

ACED ESSAYS