100% (1)
page:
7 pages/≈1925 words
Sources:
4
Style:
APA
Subject:
IT & Computer Science
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 51.03
Topic:

Operating Systems Vulnerabilities in Chevron (Windows and Linux)

Research Paper Instructions:

Congratulations, you are the newly appointed lead cybersecurity engineer with your company in

the oil and natural gas sector. This is a senior ­level position. You were hired two months ago

based on your successful cybersecurity experience with a previous employer.

Your technical knowledge of cybersecurity is solid. However, you have a lot to learn about this

company's culture, processes, and IT funding decisions, which are made by higher

management.

You have recently come across numerous anomalies and incidents leading to security

breaches. The incidents took place separately, and it has not been determined if they were

caused by a single source or multiple related sources. First, a month ago, a set of three

corporate database servers crashed suddenly. Then, a week ago, anomalies were found in the

configuration of certain server and router systems of your company.

You immediately recognized that something with your IT resources was not right. You suspect

that someone, or some group, has been regularly accessing your user account and conducting

unauthorized configuration changes.

You meet with your leadership to discuss the vulnerabilities. They would like you to provide a

security assessment report, or SAR, on the state of the operating systems within the

organization. You're also tasked with creating a non­technical narrated presentation

summarizing your thoughts.

The organization uses multiple operating systems that are Microsoft­based and Linux­based.

You will have to understand these technologies for vulnerability scanning using the tools that

work best for the systems in the corporate network.

You know that identity management will increase the security of the overall information systems

infrastructure for the company. You also know that with a good identity management system,

the security and productivity benefits will outweigh costs incurred. This is the argument you must

make to the stakeholders.

There are six steps that will help you create your final deliverables. The deliverables for this project are as follows:

Security Assessment Report (SAR): This report should be a 7 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.

Nontechnical presentation: This is a set of 8 PowerPoint slides for upper management that summarizes your thoughts regarding the findings in your SAR.



The audience for your security assessment report (SAR) is the leadership of your organization, which is made up of technical and nontechnical staff. Some of your audience will be unfamiliar with operating systems (OS). As such, you will begin your report with a brief explanation of operating systems fundamentals and the types of information systems.

After reviewing the resources, begin drafting the OS overview to incorporate the following:



-Explain the user's role in an OS.

-Explain the differences between kernel applications of the OS and the applications installed by an organization or user.

-Describe the embedded OS.

-Describe how the systems fit in the overall information system architecture, of which cloud computing is an emerging, distributed computing network architecture.



You just summarized operating systems and information systems for leadership. In your mind, you can already hear leadership saying "So what?" The organization's leaders are not well versed in operating systems and the threats and vulnerabilities in operating systems, so in your SAR, you decide to include an explanation of advantages and disadvantages of the different operating systems and their known vulnerabilities.

Based on what you gathered from the resources, compose the OS vulnerability section of the SAR. Be sure to:

Explain Windows vulnerabilities and Linux vulnerabilities.

Explain the Mac OS vulnerabilities, and vulnerabilities of mobile devices.

Explain the motives and methods for the intrusion of the MS and Linux operating systems;

Explain the types of security awareness technologies such as intrusion detection and intrusion prevention systems.

Describe how and why different corporate and government systems are targets.

Describe different types of intrusions such as SQL PL/SQL, XML, and other injections

You will provide leadership with a brief overview of vulnerabilities in your SAR.



Then provide the leadership with the following:



Include a description of the methodology you proposed to assess the vulnerabilities of the operating systems. Provide an explanation and reasoning of how the methodology you propose, will determine the existence of those vulnerabilities in the organization’s OS.

Include a description of the applicable tools to be used, and the limitations of the tools and analyses, if any. Provide an explanation and reasoning of how the applicable tools to be used, you propose, will determine the existence of those vulnerabilities in the organization’s OS.

Include the projected findings from using these vulnerability assessment tools.

In your report, discuss the strength of passwords, any Internet Information Services' administrative vulnerabilities, SQL server administrative vulnerabilities, and other security updates and management of patches, as they relate to OS vulnerabilities.



such as MBSA. Then make a recommendation for using these types of tools (i.e., MBSA and OpenVAS), including the results you found for both.



Remember to include these analyses and conclusions in the SAR deliverable:



After you provide a description of the methodology you used to make your security assessment, you will provide the actual data from the tools, the status of security and patch updates, security recommendations, and offer specific remediation guidance, to your senior leadership.

You will include any risk assessments associated with the security recommendations, and propose ways to address the risk either by accepting the risk, transferring the risk, mitigating the risk, or eliminating the risk.

Include your SAR in your final deliverable to leadership.



Please, in-text citations and references are very important in this paper. The last paper you wrote for me was awesome. Keep it up. Thank you.

Research Paper Sample Content Preview:

Operating System Vulnerabilities
Student’s Name
Institutional Affiliation
Operating System Vulnerabilities
Security practices are critical to any organization regardless of its size in order to protect the information being stored on its systems. Large organizations are attractive targets for cybersecurity due to the information that it stores. Technological advancements have changed how organizational operations are being executed. Nowadays, organizations have various computers being connected to high-capacity internet access which allows exchange if information at high speeds. This does not only accommodate the many users in the organization, but exposes it to hackers. Problems in Chevron may be as a result of weaknesses in network and web-based computer programs as well as operating systems. Therefore, the objective of this report is to assess security threats and system related vulnerabilities and present them to the management of the company. It also aims at providing recommendations that will help in addressing the identified threats and vulnerabilities.
This report aims at helping the management understand the different operating systems and user applications that it uses. It also discusses the various vulnerabilities of Windows, Linux and Mac operating systems as well as the methodology of assessing these vulnerabilities. Overall, this report aims at shedding light to the management about the various vulnerabilities related to the different operating systems to enable the leadership understand the security threats.
OS Overview
Definition of terms
Operating system: This is a program which acts as a an intermediary between computer hardware and its user. Its purpose is to provide an environment where the user can execute commands and use the hardware effectively. Therefore, an operating system performs various tasks such as memory management, process management and file management.
Role of User in an OS
The OS user is also known as the user interface and it forms the most important component of the operating system. It is considered as the OS’s visions without which the user cannot enter commands. Technically, the user interface enables the user to instruct the operating system in order to receive an output from the system.
How the systems fit in IS architecture
The systems are fitted into the IS architecture using the “virtualization” concept. This concept is the basis for computing models by making what “real” what is not. Virtualization enables organizations to move their applications which include the information technology infrastructure segments.
Kernel Applications and User Applications
For a computer to perform the assigned tasks, it has to get help from various programs that comprises set of instructions in order to complete the task. Kernel and user applications are the programs that help the computer execute the commands for a successful completion of the task. Kernel applications act as intermediaries between the computer hardware, software and the user. Therefore, they are bridge between the hardware and software of the computers. Kernel applications enable the computer to run a specific program being run by sending instructions to the hardware parts. On the other hand, user applications are any software which is used to perform a certain task on the computer. The user installs a software in a computer to enable him perform certain tasks efficiently. The common example of user application software is office suit which enables the user to perform documentation tasks in an efficient manner. Kernel and user applications are inter-related and essential for each other to function on a computer. Kernel applications acts as a communication channel between the computer hardware and software and instructs the hardware to perform functions of user applications.
Embedded OS
This is an OS which is designed for embedded computer systems (combination of software and hardware designed for specific functions within a larger system). Embedded OS are designed to be compactible, reliable and efficient forsaking most of the functions that standard operating systems perform and specialized applications may not be used. The hardware for embedded OS is resource limited. Moreover, OS for embedded hardware are specific meaning they are designed to perform specific tasks depending on the available resources.
The difference between embedded OS and the standard desktop operating systems is that the application is bundled into a single executable image. This implies that it does not load and execute single applications based on the user request like the standard desktop operating systems do. The common examples of embedded OS are Satellite Navigation Systems and ATMs. The big difference between a standard and embedded OS is that standard OS enables the user to freely interact with the computer to perform various tasks while an embedded OS allows the user to perform a specific function.
Vulnerabilities Overview
Operating System Vulnerabilities
The term vulnerability is considered to be a violation of security policies within a system. This can be as a result of weak security policies or a problem within the system itself. In general all operating systems have vulnerabilities and the degree of their seriousness depends on the damage they cause to the system. Therefore, vulnerability can be considered to be an exposure in an operating system that allows attackers to execute commands as other users, access data without proper authorization, deny the user some service and many more.
No operating system is safe, discussed below are some of the vulnerabilities present in windows and linux.
Windows and Linux Vulnerabilities
A number of vulnerabilities have been discovered in Windows and Linux operating system with the severe one can allow code execution. Therefore, an exploitation of these vulnerabilities could allow the attacker to gain access to the system to view, change or delete data. The attacker can also be able to install programs that can steal data. Moreover, the attackers are able to c...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!