logo

System Security at Windows | Paper

   

Added on  2022-08-12

10 Pages2108 Words19 Views
 | 
 | 
 | 
Running head: SYSTEM SECURITY AT WINDOWS
SYSTEM SECURITY AT WINDOWS
Name of the student:
Name of the university:
Author Note:
System Security at Windows | Paper_1

SYSTEM SECURITY AT WINDOWS1
Abstract
The organizations are bend to make their security systems strengthened nowadays in order to
protect their most important asset, their information. Security is applied on the systems,
operations as well as the internal controls, in order to maintain the integrity and
confidentiality of data. The hackers nowadays also incorporate different smart techniques to
cause damage to the malicious codes and extract important data from the information
systems. Hence, in this report, the security goals of the Windows Operating System are
discussed thoroughly such that the organizations can align these goals with their business
process before incorporating the system. Moreover, the control measures for the different
features of Microsoft Windows are included to check how these controls functions properly
for implementing security of the organization. Finally, in the last section of the paper the
security tools and audit principles are revised for an organization to function efficiently with
the Windows Operating System.
System Security at Windows | Paper_2

SYSTEM SECURITY AT WINDOWS2
Table of Contents
Introduction................................................................................................................................3
How do you know if your system is meeting your security goals?...........................................3
You can verify that controls are working, but how do you know if they are getting the job
done?..........................................................................................................................................4
What auditing practices or procedures would you implement for your organization? Why?. . .5
Conclusion..................................................................................................................................7
References..................................................................................................................................8
System Security at Windows | Paper_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Measures That Future plus Should Take to Prevent Its Staff Members, Including Casual Staff From Handling Information Unethically
|2
|765
|18

Information Security: CIA Triad, ATM Security, Biometric Authentication, Caesar Cipher
|13
|2577
|292

Host and Application Security
|9
|1653
|308

Computer and Network Security Content
|21
|1055
|20

Types of Computer Security Techniques
|14
|4116
|383

Information Security: Confidentiality, Integrity, and Availability
|12
|2845
|300