Same Instructions attached: This Project is for a Cybersecurity field. General: This report should be a Security Assessment Report (SAR), and includes a summary of thoughts about the findings in the report SAR: This report should include the following: A. Brief explanation of Operating System(OS) fundamentals, types and types of Information System (IS) – IS Infrastructure Components: Facilities, HR, Services – IS Infrastructure Threats: physical, software, human – IS Controls: Preventive, Detective, Corrective. Disaster recovery – Password Protection – Cloud computing – Web architecture The above points should be able to answer the following questions: 1. Explain the user’s role in an OS. 2. Explain the differences between kernel applications of the OS and the applications installed by an organization or user. 3. Describe the embedded OS. 4. Describe how the systems fit in the overall information system architecture, of which cloud computing is an emerging, distributed computing network architecture. B. Operating System Vulnerabilities : explain the advantages and disadvantages of the different operating systems and their known vulnerabilities. • explain Windows vulnerabilities and Linux vulnerabilities • explain the Mac OS vulnerabilities, and vulnerabilities of mobile devices; • explain the motives and methods for intrusion of the MS and Linux operating systems; • explain the types of security awareness technologies, such as intrusion detection and intrusion prevention systems; • describe how and why different corporate and government systems are targets; and • describe different types of intrusions such as SQL PL/SQL, XML, and other injections. C. Vulnerability Scan: Vulnerabilities Assessment and patches – Vulnerabilities Assessment (what’s vulnerability,

Leave a Reply

Your email address will not be published. Required fields are marked *