CS652_GaryVincent_IP5.docx - CS652-1503B-01: Operating...

This preview shows page 1 - 5 out of 25 pages.

CS652-1503B-01: Operating Systems SecurityCS652-1503B-01Operating Systems SecurityGary VincentSeptember 21, 20151
CS652-1503B-01: Operating Systems SecurityTable of ContentsTable of Contents.........................................................................................................................................2Company Profile......................................................................................................................................3Purpose....................................................................................................................................................3Operating System Security Tools.................................................................................................................4Microsoft.................................................................................................................................................4Red Hat Linux.........................................................................................................................................4OS X........................................................................................................................................................5Security Threat Detection............................................................................................................................6Security Threat Detection........................................................................................................................6Built-in Security Analysis........................................................................................................................7Secure Communications..............................................................................................................................9Threats.....................................................................................................................................................9Tools......................................................................................................................................................10Virus Protection.........................................................................................................................................12Comparison of Anti-Virus Solutions......................................................................................................13McAfee..............................................................................................................................................13Norton................................................................................................................................................14Bitdefender........................................................................................................................................14Policies..................................................................................................................................................14Security Management................................................................................................................................18Security Incident Response Policy.........................................................................................................18Section 1: Introduction......................................................................................................................18Section 2: Roles and Responsibilities................................................................................................18Section 3: Policy Directives...............................................................................................................19Section 4: Enforcement, Auditing, and Reporting..............................................................................20Section 5: References........................................................................................................................20Section 6: Control and Maintenance..................................................................................................20Evaluations and Recommendations.......................................................................................................21IRT Tools...........................................................................................................................................21Security Cost Benefit Analysis..........................................................................................................22References.................................................................................................................................................232
CS652-1503B-01: Operating Systems SecurityCompany ProfileThis section has been repurposed from CS632-1503A-01, Instructor Dr. Susan ColeVinTek has been in business for 10 years experiencing steady growth as a result of itsaward winning customer service and customized applications that have helped a number ofcompanies, to include government agencies, find cost effective solutions to meet their uniqueneeds and business requirements. The company is located in Fenton, MI and employs 98 teammembers including 50 application developers on 10 teams, 5 project leaders, 10 IT professionalsand 23 working in such roles as customer relations, human resources, and management. Thecustomer solutions are developed and maintained from within VinTek’s infrastructure. They arealso developed according to the customer needs that mean they can be Windows, iOS, Android,or Linux or Unix based according to the specifications and scope of the project. As such,VinTek’s internal infrastructure must allow for interconnectivity between all these types ofdevices as well. Most of the developers use Mac Book Pros with iOS X, while others and frontoffice users are using Windows 7. VinTek servers operate on Red Hat Linux. It should also benoted that VinTek developers are permitted to work from home, as needed requiring them toconnect to company resources through a virtual private network when pushing or pulling sourcecode from the company servers.PurposeThe purpose of this Operating Systems Security Policies Document discuss some of thetools related to operating system security, threat detection, secure communications from withinand outside the network, protecting your systems against viruses and security management.[Col14].3
CS652-1503B-01: Operating Systems SecurityOperating System Security ToolsThere are any number of tools used to secure VinTek’s client and server computingsystems. These tools are currently used to detect and prevent malicious activity on the networkand to protect the company’s internal data as well as the data of the company’s client’s sensitiveinformation. Many tools are platform specific and some are listed below with brief descriptions

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 25 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Winter
Professor
N/A

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture