IT Network Security Assignment - Windows, Linux, and System Security

Verified

Added on  2022/12/27

|32
|3402
|75
Homework Assignment
AI Summary
This IT Network Security assignment explores various aspects of securing computer systems and networks, with a particular focus on operating systems such as Windows 10 and Linux. The document details the importance of selecting the appropriate operating system based on workplace requirements, including business and educational needs. It covers essential topics like data migration, the role of network administrators, desktop applications, and the installation processes of operating systems. Furthermore, the assignment discusses file systems, software licensing, and data security measures. It provides step-by-step guides for installing Windows and Linux, along with security procedures for staff and students. The document also touches upon network configuration, backup and restore facilities, IP addresses, patches, and diagnostic tools. It emphasizes the significance of firewalls, IDS, and IPS systems in protecting networks from cyber threats. The assignment concludes with a discussion of the boot process, BIOS, and essential hardware components required for operating system installation, alongside an overview of security principals and access control.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: IT Network Security 0
IT network Security
Individual task
Student name
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
IT Network Security 1
Table of Contents
Part A...........................................................................................................................................................1
Part B...........................................................................................................................................................1
Part C...........................................................................................................................................................1
References...................................................................................................................................................1
Document Page
IT Network Security 2
Part A
1. There are different types of operating systems are available in the market, such as windows, Linux,
Mac, and many others. In addition, it is necessary to install a properly operating system based on
the requirements.
1) Windows 10 S is the best operating system for the workplace, as it requires operating systems for
two purposes, which are education and business (Fisher , 2018). It provides both facilities for the
workplace. The workplace can install different business software for managing different business
processes, such as word processing, payroll management, accounting, and many other types of
software.
2) In the present era, both Windows and Linux operating systems are used. It is necessary to
implement the latest operating system in a computer system to secure them from a different type of
cyber-attacks. In the present situation, the Windows operating system is used and now for staff
members, the university should use windows 10 S operating system because it can manage both
things, which are enterprise and education.
3) Data migration is a risky task because it affects different issues. University should implement
security requirements. Staff members can do different works, which can be related to education and
business purposes as well, such as admission, examination, data analysis, and many others.
2. Network Administrator can provide desktop applications, such as word processing, audio and video
player, browsers, image viewer, network management software, pdf viewer, antivirus, and many others.
Word processing applications are highly used in daily purposes by a user in a computer system for
reporting and other things. Microsoft provides a full version of Microsoft office 2016 including word,
excel, PowerPoint, access, and many others.
3. The installation process takes more than 2 hours for a single system and other software take
individual time in installation. It is necessary to install all the software for different work. There are
different methods for installing the operating system, which are USB drive, CD/DVD drive, network, and
many others. In addition, access control is necessary for securing a computer system form attackers. In
addition, there are many other things, which make effects on the processing of sites. However, a single
operating system takes a minimum two hours for the installation process including desktop application.
Document Page
IT Network Security 3
There are many desktop applications, which are necessary for the user, such as pdf reader, word
processing, and utility software.
Part B
4. It is necessary to define proper file systems in installation time. In the case of Windows operating
system, NTFS is used for primary and logical volumes. Primary volumes should have proper space for all
the applications, such as Master Boot Record (MBR), Primary drive should have proper space, such as
200GB for operating systems and different desktop application software, such as word processing,
antivirus, and many others.
5. There are many licenses are available in the market application software. It is necessary to use
properly licensed software in the university rather than pirated software. It makes a huge impact on the
performance and reputation of the university ( Walli, 2013).
6. Data security is necessary for a system because data and information are so important in a university.
Data migration include different things, which are selecting data, preparing, extracting, and tan forming
from one storage to another storage. It is necessary to check the complete system before connecting
with the main network. Data is important from different points of views, such as confidential data,
sensitive data, and personal information.
Part C
7. Operating system 1 (Windows 10)
Step 1: insert the booting media in the computer system:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
IT Network Security 4
Source: (Chee & Chong Seng, 2015)
Step 2: choose the language and other things based on requirements
Source: (Chee & Chong Seng, 2015)
Step 3: Validate your products
Document Page
IT Network Security 5
Source: (Chee & Chong Seng, 2015)
Step 4: accept the license
Source: (Chee & Chong Seng, 2015)
Step 5: choose the type of installation
Document Page
IT Network Security 6
Source: (Finnamore, 2017)
Step 6: select the drive for installation of windows 10
Source: (Finnamore, 2017)
Step 7: complete all the processes
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT Network Security 7
Source: (Finnamore, 2017)
Step 8: make proper settings
Source: (Finnamore, 2017)
Step 9 makes sure you are the owner or organization
Document Page
IT Network Security 8
Source: (Finnamore, 2017)
Operating systems 2 (Linux)
Linux operating system is easy and fast (Broida, 2017).
Step 1: insert media for installation
Source: (guru99.com, 2019)
Document Page
IT Network Security 9
Step 2: select drive for installation
Source: (guru99.com, 2019)
Step 3: erase all and create new file systems
Source: (guru99.com, 2019)
Step 5: select time zone
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
IT Network Security 10
Source: (guru99.com, 2019)
Step 6: chose keyboard language
Source: (guru99.com, 2019)
Step 7: create a user name and password properly. Password should be a minimum of eight characters
and a mix of numbers, characters, and special symbols.
Document Page
IT Network Security 11
Source: (guru99.com, 2019)
Step 8: complete all the processes
Source: (guru99.com, 2019)
8. Staff and students should follow all the security procedures to use computer systems, such as power
on and power-off. There is a safety manual, which is provided by the Australian government for all the
users.
Document Page
IT Network Security 12
9. The university should adopt a properly licensed version of Microsoft Windows 10 from online or
offline vendors. It is necessary to install all the hardware and software, which are required for staff and
students, such as word processing, antivirus, firewalls, and many others (Microsoft, 2019).
10. We can connect the operating system from the wired and wireless network to install and configure a
desktop operating system. Linux is open source software with a license to use different applications
(Opensource.org, 2018).
Source: (wikihow.com, 2019)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT Network Security 13
Source: (wikihow.com, 2019)
Source: (wikihow.com, 2019)
We can make a backup of all file and directories in Linux as well.
Document Page
IT Network Security 14
Source: (Newell, 2018)
11. The operating system provides backup and restores facility
12. We can upgrade or install a new copy of the operating system.
Document Page
IT Network Security 15
Source: (Finnamore, 2017)
13. User can set different things for connecting computer system from the network. An IP address is a
local address of a computer system to access in a network from other systems.
14. Patches are used for increasing security and reliability of operating system and application.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
IT Network Security 16
15.
16.
Document Page
IT Network Security 17
17.
18.
Document Page
IT Network Security 18
19.
20.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT Network Security 19
21.
22.
Document Page
IT Network Security 20
23.
24.
Document Page
IT Network Security 21
25.
26.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
IT Network Security 22
27. The diagnostic can be started from the setting of windows
Document Page
IT Network Security 23
Diagnostics are done by the company to ensure that all the functions are performed within the
organization in an appropriate manner. After diagnosing it suggests the systems to perform certain kinds
of operations that can keep the health of the Windows better. It is useful in keeping data secure and
allows windows to operate normally. This is done in both the case i.e. basic or full diagnostic. Users must
immediately respond to the results provided by the diagnostics done by the Windows.
28. Troubleshoot can be started from the setting of windows systems.
29. Desktop start menu will provide various options
Document Page
IT Network Security 24
Answers
1. Create a user name and password properly. Password should be a minimum of eight characters
and a mix of numbers, characters, and special symbols.
2. A user can choose a different method for logins, such as PIN number, password, picture
password, and many others. User must start windows firewall and defender to secure all the
applications and data in the computer system.
3. There are many hardware components are checked, when an operating system installed in a
computer system, which are RAM, ROM, hard disk, CD/DVD ROM, Processor, SMPS, and many
others.
4. The NTFS file system is the best file system for Windows operating systems. It provides fast and
compressed disk space for memory storage, which is good in access of data from RAM.
5. There are different methods for installing operating systems. Few common methods are USB,
CD/DVD ROM, and through an internet connection.
6. Software integration is a process in which all the software are interlinked with the processor and
processor use that software using message passing and pipeline concepts to avoid a collision.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT Network Security 25
7. There are different types of diagnostic tools available in the Windows operating systems, such as
windows, memory diagnostic tool, administrative tools, diagnostic data viewer, performance
information, and tools.
8. Windows memory diagnostic tool is used for memory check and it makes a huge change in the
bad sectors of memory and provides fast access of data to the processor. Windows have a
hardware diagnostic tool for checking hardware connectivity and their status. Network
diagnostic tool is used for the checking status of a network. Therefore, admin can check all the
things properly.
9. Windows system has strong access control to avoid misuse of the system and secure data and
system from unauthorized access of the system. There are four basic components of security
principals, which are security identifiers, access tokens, security descriptors, and access control
lists and permissions.
Security identifiers
Security identifiers (SIDs) provide a fundamental building block of the windows protection model. The
paintings with unique components of the authorization and access control technologies within the
safety infrastructure of the Windows Server operating systems. This allows protect get right of entry to
network assets and affords greater secure computing surroundings.
Access tokens
Get admission to the token is a blanketed object that incorporates facts about the identification and
consumer rights, which might be related to a personal account. While consumer signs in interactively or
attempt to make a community connection to a laptop walking windows, the signal-in method
authenticates the person’s credentials. If authentication is a success, the technique returns a SID for the
user and a list of SIDs for the user’s security organizations.
Security descriptors and access control lists
A protection descriptor is an information structure that has related to each securable item. All objects in
energetic directory and all securable objects on a neighborhood computer or at the network have
protection descriptors to help control get right of entry to the items.
Document Page
IT Network Security 26
An object’s protection descriptor can comprise two varieties of ACLs:
1. a discretionary get right of entry to manage listing, which identifies the customers and agencies.
2. machine get admission to manipulating list, which controls how to get right of entry to is audited
Permissions
Permissions allow the proprietor of every securable object, consisting of a report, active directory
object, or registry key, to manipulate who can perform an operation or a hard and fast of operations
at the item or object belongings. Permissions are expressed within the safety architecture as getting
admission to control entries (ACEs).
10. A firewall is a hardware and software, which has used to protect a network from outsiders, such
as attackers. It is a wall between the private network and the public network.
11. The computer system can be infected from virus from different vulnerabilities, which are open
ports, lack of antivirus, use of USB drives, use of the network without firewalls, access infected
websites, and many others (Yadav, 2018). A firewall is necessary to stop untrusted websites in a
particular network and computer system. IDS and IPS systems are also helpful to provide
security to the network.
12. There are different software are available in the market, such as visual studio for Windows
operating system, MSDN library, utility software, antivirus, word processing software, and many
others.
Document Page
IT Network Security 27
13. Windows 10 has many advanced features, such as the new start menu, universal apps, virtual
desktops, Edge web browser, and Cortana integration. All those features make it different from
others. It supports cloud-based applications, which are common nowadays. Therefore, it is
necessary to install the latest system to avoid any security breaches.
14. There are few things, which are necessary for operating systems installation, which are RAM,
ROM, storage disk, processor, and power supply.
15. The boot process is a process in which processor take a media to install an operating system in
that particular hardware.
16. BIOS is the basic input output system, which is used to configuring many things about the
system, such as booting preferences, knowledge of hardware, and many others.
17. We can access bios by press delete key or f9 key. It was based on the vendors.
18. Internet protocol has used for transfer data in packets and provides addressing for users
(Kenneth C. Mansfield & Antonakos, 2009).
19. An IP address is a local address, which provides a live location of a computer system. It is like a
postal address in a computer network, which can be changed according to needs. An IP address
is a 32-bit long address, such as 192.168.10.58.
20. Dynamic Host Configuration Protocol (DHCP) provides dynamic addresses to the computer
system when they are alive. It is necessary to manage all the things properly. The dynamic
address is solving a problem of static addresses.
21. The subnet address is providing knowledge about the host and network identity. It is used to
separate a network and hosts from others. It can be used for making a separate network.
22. Print spooling has used for providing first come first serve facility to all the requests to the
printer. It is a system in which anyone can give print from the network and spooler make a
queue of all the processes and complete all the processes one by one.
23. Print queue management system is helpful in a shared printer, the order is necessary for prints.
Therefore, it should be managed by a system. Print queue management system is necessary for
maintaining order between all the processes.
24. There are many regulatory requirements for the desktop operator, which areas:
1. Check electricity properly
2. It is necessary to diagnosis all the things before starting a system
3. The user always use air-conditioner for system and a person as well
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
IT Network Security 28
25. There are many remote desktop applications are available in the market for different operating
systems. Windows OS have team viewer, VNC Connect, Splashtop, any desk. Linux can use this
software for remote desktops, such as Zoho Assist, TigerVNC, RealVNC, TeamViewer, Remmina,
XRDP, FreeNX, and many others.
26. Windows 7 has many compatibility issues, which areas:
Windows 7 Driver Compatibility Issues: most of the drivers of windows create computability
issues because of 32-bit and 64-bit. The user can install the driver for network, graphics, audio,
video, and many others from the official site of Microsoft.
Windows XP (& Older) Reverse Compatibility Issues: after installation of Windows 7, the system
will create an issue in reverse compatibility. It can be solved using a boot manager.
32 bit vs. 64-bit Compatibility Issues: most of the system is 32-bit and it faces issues in the
installation of different application. Therefore, proper version should download for the 64-bit
systems. This issue is faced because of processors and it makes issues in installation.
27. Mac OSX snow leopard has few compatibility issues. These are a few issues:
1. It is not installing on the hard disk: in case of Boot camp, the installer may refuse installation of Snow
Leopard in the internal hard disk in the subsequently removed windows operating system (Villazon,
2010).
Document Page
IT Network Security 29
Source: (Villazon, 2010)
It can fix in the disk utility function, create a partition line away, and then apply changes.
2. Cannot change application icons
The old process is not working properly because it requires permission. Therefore, open terminal and
execute this command for quit finder, which is sudo /System/Library/Core Services/
Finder.app/Contents/MacOS/Finder.
Document Page
IT Network Security 30
References
Walli, S. R., 2013. Which open source software license should I use?. [Online]
Available at: https://opensource.com/law/13/1/which-open-source-software-license-should-i-use
[Accessed 11 December 2018].
Broida, R., 2017. How to install Linux. [Online]
Available at: https://www.cnet.com/how-to/how-to-install-linux/
[Accessed 27 January 2019].
Chee, I. & Chong Seng, N., 2015. Here's a step-by-step guide to installing Windows 10. [Online]
Available at: https://www.hardwarezone.com.my/feature-heres-step-step-guide-installing-windows-10
[Accessed 10 June 2019].
Finnamore, C., 2017. How to clean install Windows 10 and create boot media: Refresh your Windows 10
PC. [Online]
Available at: https://www.expertreviews.co.uk/software/operating-systems/1401617/how-to-clean-
install-windows-10-and-create-boot-media/page/0/1
[Accessed 12 June 2019].
Fisher , T., 2018. How to Install a Windows Operating System. [Online]
Available at: https://www.lifewire.com/how-to-install-a-windows-operating-system-2624925
[Accessed 27 January 2019].
guru99.com, 2019. How to Download & Install Linux (Ubuntu) in Windows. [Online]
Available at: https://www.guru99.com/install-linux.html
[Accessed 11 June 2019].
Kenneth C. Mansfield, J. & Antonakos, J. L., 2009. Computer Networking for LANS to WANS: Hardware,
Software and Security. 1 ed. Bostan(MA): Cengage Learning.
Microsoft, 2019. Download Windows 8.1 Disc Image (ISO File). [Online]
Available at: https://www.microsoft.com/en-us/software-download/windows8ISO
[Accessed 27 January 2019].
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT Network Security 31
Newell, G., 2018. How to Backup Ubuntu Files and Folders. [Online]
Available at: https://www.lifewire.com/backup-ubuntu-4126286
[Accessed 14 June 2019].
Opensource.org, 2018. Licenses & Standards. [Online]
Available at: https://opensource.org/licenses
[Accessed 11 December 2018].
Villazon, L., 2010. 20 Snow Leopard problems solved. [Online]
Available at: https://www.techradar.com/news/computing/apple/20-snow-leopard-problems-solved-
666067/2
[Accessed 17 June 2019].
wikihow.com, 2019. How to Install Linux. [Online]
Available at: https://www.wikihow.com/Install-Linux
[Accessed 11 June 2019].
Yadav, A., 2018. Network Design: Firewall, IDS/IPS. [Online]
Available at: https://resources.infosecinstitute.com/network-design-firewall-idsips/
[Accessed 14 March 2019].
chevron_up_icon
1 out of 32
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]