• 826fed4ccc8f636e67235a5eb01d0710e22fc08b
  • 6ece0e7a7c1ab31ccc6ee41a4cb3fe7982eb6b10
  • D8847db5dd415d156e5c8ac8028d4601cf941503
  • D0dd70459e7c969f14983817cc8dde914201e0f2
  • 1065edf923e646c69a9f5a449c84b3ef1b90aa9d


Pay with paypal

* Once your purchase is processed by paypal you will be redirected back to this page and the download button will be activated allowing you to download Purchase to Download

Operating Systems Security Strategies

Computer Science 550 Words 2 Pages
Paper Details


Operating Systems Security Strategies (itas463-1404b-01)

Unit 1 Discussion Board

Assignment Details

Midwest Web Sites is excited to know and understand more about the potential security issues associated with its environment and is anxious to correct everything that it can. Upon initial conversations with the team at MWS, you have found that they are confused about some of the terms you are using. Take this opportunity to describe the following

• Virus and worm

• Buffer attack

• Denial of service

Pick 1 of the following operational areas at MWS and describe at least 3 common vulnerabilities that the workstations or servers might be subject to with respect to operational security:

• Mac Computers

• Desktop and laptop Windows systems

• Linux servers

Your initial post to the Discussion Board should be 5–6 paragraphs. Use at least 2 credible sources, and cite your sources in proper APA format.


  • Title: Operating Systems Security Strategies
  • Length: 2 pages (550 Words)
  • Style: APA


Every computer system has a central piece of software called operating system that controls its functionality. It is a very important software that manages a computer’s software, hardware, processes, and memory. Due to the essential role of an operating system, lack of its security has an impact on a computer system’s overall security. A compromise in the operating system certainly affects the applications running in the computer system.

Operating system security is the process used to ensure an operating system’s availability, integrity and confidentiality (Oshria, Kotlarskyb, & Hirschc, 2007). It comprises specific measures that are used to guard an operating system from threats such as worms, viruses, malware, and attacks among others. A virus refers to a segment of a code attached on a legitimate program that replicates itself in other programs, hard drive, or data files. If the replication succeeds, it causes harm to the infected files. This harm may include stealing central processing unit time or hard disk space, corrupting data, and accessing private information among others. Nevertheless, not all viruses cause destruction- replication is the only characteristic that defines viruses.

Full paper available for: $6.00