logo

Cyberspace & Cybersecurity Foundations

   

Added on  2022-09-01

10 Pages1651 Words104 Views
Leadership Management
 | 
 | 
 | 
Cyberspace & Cybersecurity
Foundations
Name of the Student:
Register ID:
University:
Cyberspace & Cybersecurity Foundations_1

Table of Contents
Project 1: Operating Systems Vulnerabilities (Windows and Linux)..................................................................................1
1. Assessment Overview................................................................................................................................................ 1
2. Reason to Conduct Security Review.......................................................................................................................... 1
3. About OS.................................................................................................................................................................. 2
Step 1: OS Overview..................................................................................................................................................... 2
Step 2: OS Vulnerabilities............................................................................................................................................. 3
Step 3: Vulnerability Scanning...................................................................................................................................... 4
Step 4: Review Vulnerability Assessment Tools for OS and Applications........................................................................5
Step 5: Create the Security Assessment Report..............................................................................................................5
Step 6: Develop the Presentation................................................................................................................................... 5
4. Risk Summary.......................................................................................................................................................... 5
5. Conclusion and Recommendation.............................................................................................................................6
References........................................................................................................................................................................ 7
Cyberspace & Cybersecurity Foundations_2

Project 1: Operating Systems Vulnerabilities (Windows and Linux)
1. Assessment Overview
This report revolves around a company in the oil and natural gas sector, where a lead
cybersecurity engineer is newly appointed in a senior-level position. It just been two months
that the cybersecurity engineer is appointed, and still he not aware of the company. In this
company, the higher management takes the decisions related to company's culture, processes,
and IT funding.
The higher level officials of the company have asked him to deliver a
security assessment report/SAR, to represent the vulnerabilities on the available operating
systems. The company has Microsoft and Linux-based operating systems. These OSs are
understood for scanning the vulnerabilities, with the help of a tool.
The lead cybersecurity engineer must help the stakeholders understand that the
identity management can maximize the company’s security for the whole information
system’s infrastructure. And, it is important to have an effective identity management
system, security and productivity benefits, which can outweigh the incurred costs.
2. Reason to Conduct Security Review
The lead cybersecurity engineer has observed several anomalies and incidents, which
are directing towards security breaches. It is still not determined whether the incidents are
taken place by a single or multiple sources.
In this two months, the lead cybersecurity engineer has encountered crashing of three
corporate database servers, identified some anomalies in certain server and router system’s
configuration. As per his expertise he knew that there is some problem in the IT resources.
1
Cyberspace & Cybersecurity Foundations_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyberspace & Cybersecurity Foundation
|15
|544
|34

Key Features and Services of Operating Systems - Examples
|7
|1373
|13

Implementation of Virtualization in Software
|2
|926
|92

Operating System: Services, Security Risks, and Evaluation
|8
|2176
|28

Vulnerability assessment Report
|17
|1293
|29

Fundamentals of Operating Systems and Programming
|6
|1111
|292