Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Topic: Week 1 1 Operating System Security Submission: Five minutes before the end of the tutorial: all files must be uploaded on Moodle. Students should
Topic: Week Operating System Security
Submission: Five minutes before the end of the tutorial: all files must be uploaded on Moodle.
Students should complete and submit the below exercises of this tutorial while their classmates are giving a presentation.
Exercise :
Estimated completion time: minutes
Name five famous malicious software. Then, research about them and explain how they attack and take down their targets?
Exercise :
Estimated completion time: minutes
Find one article or news which published about an intruder. What did you find interesting inside of that article?
Exercise :
Estimated completion time: minutes
You are hired in Professional in IT Pty Ltd as an IT System Manager. The General Manager asked you to prepare a report for a senior management meeting, that what are you going to do and your plan about the IDS and Staff access control on systems and files.
You need to write a concise presentation report with charts and diagrams about your plan. Your report should be about words and presenting that report should not take more than minutes.
Exercise :
Estimated completion time: minutes
Research about some enterpriselevel logging systems for your company which you have hired in the previous question.
Need to have a comparison and good reasons that why you suggest one of those systems and what is the benefit your company will achieve with that system, in the security and managing systems and network.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started