OPERATING SYSTEM -9

profilemins86

 

Week 9 Assignment:

  • Describe the CIA security concepts as related to operating systems. (Confidentiality, Integrity, Authentication, Authorization, and Availability.)
  • From the list, describe three common methods used to exploit weaknesses in an operating systems, and describe ways to mitigate these risks. (Spoofing, deception, man in the middle, back door, Trojan Horse, rootkit, etc.)

Submit a two to three page paper in APA format.

    • 3 years ago
    • 7
    Answer(1)

    Purchase the answer to view it

    blurred-text
    • attachment
      TURNITINREPORT3433.pdf
    • attachment
      CIASecurityConcepts.docx