What is the Compile-time defenses /techniques to harden programs to resist attacks against operating systems? What are the basic steps to use to secure an Operating System?
Operating system and team management
QUESTION 1 There is a need for an Intrusion Detection System. Read the given parameters and write your decision about the type of intrusion detection system you would use to fulfill the requirements;
Requirements: The intrusion detection system must
- Monitor system activities for signs of suspicious behavior.
- Analyze traffic and log malicious behavior
- Provide visibility into what’s happening on your critical security systems
- Help to identify threats inside the network perimeter
QUESTION 2 What is the Compile-time defenses /techniques to harden programs to resist attacks against operating systems?
QUESTION 3 What are the basic steps to use to secure an Operating System?
QUESTION 4 Which Access Control Models you would deploy for these given two business cases? Write the Access Control Model name for each case.
Case 1: In this Government Company uses a hierarchical approach for access control. All the documents have been classified as Confidential, Secret and Top secret. The sensitivity levels are in order from most sensitive to least sensitive. For example, Only the Employee with a Secret classification level can reach the document with a Secret classification label
Case 2: This Access Control Model determines which permissions the system grants to the user. The organization let some individuals create or modify files while providing others with viewing permission only. For example, the Human Resources Database Manager was authorized to add, change, or delete employee records for anyone in the organization but has no access to the customer database and financial database.
Question 5: Describe the four different project evaluations or reviews: (1) individual performance review, (2) postmortem review, (3) project audit, and (4) evaluation of the project’s MOV with specific examples.