100%(2)2 out of 2 people found this document helpful
This preview shows page 13 - 16 out of 17 pages.
the memory stack (Stallings (n.d.), Operating Systems: Internals and Design Principles). When you make the location of the memory tough to find, it is less likely that an injection will occur outside the boundaries. Lastly L&T Solutions will need to secure the backup data locations.Certifying restoration of valuable data is just as important as having a foundation in placefirst so that we keep the backup plan for what it is needed for. If L&T Solutions cannot recover damaged data then our business is not reliable. It is important to safeguard the children’s identities as well as the educational cloud. The best security measures should be in place in the event there is a natural disaster. (Stallings, n.d., Operating Systems: Internals and Design Principles). The fix for backing up data is to have an off-site location where the data is backed up, encrypted, and safely guarded. Some advantages to having the off-site location is you can access the data from any location, via internet or file transfer protocol (ftp); data will be
preserved if the disaster takes place within the business lines; and backup data can be shared withother remote locations. The off-site building will be man 24/7 in a gated facility with 2AF authentication factors. Another example of making sure your data is being protected is by having monthly checks to make sure the data is actually being stored and transferred to the secondary location. An excellence-rebuilding plan will require that data is recovered accurately and as fast as possible. L&T Solutions will be aware of the security issues that may compromise the launch of Windows 10. Below we will describe five major threats that we believe need to be controlled before and after the launch of Windows 10. The following threats are social engineering, web threats, operating systems corruption, software corruption, and network security.Social EngineeringIn information technology social engineering climbed to the top of the latter with computer-generated crimes. Social engineering will find the weakest element of your computer system and hoax users into giving their personal information causing identity fraud. Confusing orscaring a user into believing that they have done something wrong or can gain something lucrative very easily usually accomplishes this. The safest way to make sure this doesn’t happen is by continuing to push user education. The best acronym is K. I. S. S.; (Keep it simple sally). No help desk personnel would ever ask a user for their credentials over the internet or email unless you are already on a secure network. Web ThreatsThe purpose of a Web threat is creating mass destruction online. Most of the reasons this occurs is because there are hidden or sometimes not catchy links that individuals will click; not knowing that this is a bad idea. Unfortunately, a lot of that will also occur with the kids in the school system. The students are acting in a manner known as a drive-by-attack when they
L&T Solutions OS Design15proceed to click on links that looks appealing. Drive-by-Attacks prepare vicious downloads on your computer and messes up all the configurations. L&T Solution will look at using Google