IT207: Operating Systems week 9

profilekinjalr10

 

Week 9 Assignment:

  • Describe the CIA security concepts as related to operating systems. (Confidentiality, Integrity, Authentication, Authorization, and Availability.)
  • From the list, describe three common methods used to exploit weaknesses in an operating systems, and describe ways to mitigate these risks. (Spoofing, deception, man in the middle, back door, Trojan Horse, rootkit, etc.)

Submit a two to three-page paper in APA format.

 You are required to make at least two comments on the responses posted by you classmates with a minimum of 50 words. Make sure you design your response with your own words. Your responses to your classmates must be of substance; not just “I agree” or “Good Post.” The purpose of the responses is to convert the discussion forum into a quality academic environment through which you improve your knowledge and understanding. Read and review all assigned course materials and chapters before you start working on your assignments. 


    • 5 months ago
    • 8
    Answer(1)

    Purchase the answer to view it

    blurred-text
    • attachment
      TheCIASecurityTriad.docx
    • attachment
      TheCIASecurityTriadreplies.docx