PART 1 AND 2

This assignment has two Parts:

PART 1: The research topic for your assignment is : Compare and contrast Operating Systems and Security. Write a minimum 2 pages (Follow Lynn

standards how to write research paper)

  • Research at least two Operating Systems and compare differences, commonalities between each other with emphasis in Security.

Checklist:

Articulate the mechanisms necessary for the protection and security of operating and computer systems. Discuss the following areas:

Assess the techniques used in buffer overflow and buffer overrun.

Explain techniques of memory management.

Identify operating system and application weaknesses and vulnerabilities.

Describe the structure of operating system.

Hints for success:

These are merely pointers, you should explore other ones.

  • Read Chapter 1 from your book.
  • NIST.gov
  • SANS.org
  • Research keywords:
  • Operating System Security Risk vulnerabilities
  • Some commercial websites to use but do not limited to these ones
  • Microsoft
  • IBM
  • Apple
  • Some commercial operating systems
  • Windows
  • DOS
  • OS2
  • AS400
  • BSD
  • Open source
  • Linux
  • Unix
  • chrome
  • FreeBSD

PART 2: Kali Linux Operating System Installation and Documentation

  • Investigate – Assess issues in the design of operating systems –
  • operating system
  • and write up (create) Kali Linux installation procedure for one of the following:
  • Laptop (Windows)
  • Laptop (Mac),
  • USB,
  • Raspberry Pi.
  • (Hint: start from Kali Linux Documentation area at Kali
  • )
  • (Use screenshots for each step where appropriate and write up installation process)
  • PART 1: Operating Systems and Security Research Paper (Total: 50 points)
  1. Research and Comparison of Two Operating Systems (10 points)
  • Depth and accuracy in comparing operating systems with an emphasis on security aspects.
  1. Articulation of Security Mechanisms (10 points)
  • Quality of discussion on security mechanisms, buffer overflow, buffer overrun, and memory management techniques.
  1. Identification of Weaknesses and Vulnerabilities (10 points)
  • Insight and thoroughness in identifying and explaining operating system and application vulnerabilities.
  1. Description of Operating System Structure (10 points)
  • Clarity in describing the structure of operating systems and its relevance to security.
  1. Quality of Writing and Research (10 points)
  • Adherence to APA standards, organization of the paper, and use of diverse, quality resources.
  • PART 2: Kali Linux Operating System Installation and Documentation (Total: 50 points)
  1. Research and Assessment of Kali Linux (10 points)
  • Understanding of Kali Linux and its relevance in operating system design.
  1. Detailed Installation Procedure (20 points)
  • Accuracy and clarity in documenting the installation process, including appropriate choice of platform.
  1. Use of Screenshots and Documentation Quality (10 points)
  • Effectiveness and relevance of screenshots; quality of written documentation.
  1. Presentation and Analysis (10 points)
  • Overall presentation, organization, and reflection on the installation process and its implications.

_____________________________________________________

SEPERATE DOCUMENT FOR PART 2

Dear Students,

for this assignment the following files will need to be downloaded and installed on your laptop preferably on your C: drive

Please create a folder C:FW

Download the following files:

For the homework make sure you have the latest version of Java installed on your laptop.

Follow the instructions on the file below and answer the questions.

If you have any questions please let me know.

Best Regards,

Dr Antoniou

The document “Firewall Exercise ISM 311 V1” outlines a comprehensive exercise for students to understand and implement cybersecurity strategies using a firewall visualization tool. The exercise involves several key activities:

1. Understanding Firewall Basics: Students start with a basic setup and observe how traffic flows with and without a firewall.

2. Firewall Configuration: Students configure a firewall, experimenting with different rules to understand how they affect traffic flow and security.

3. Active Attack Simulation: The exercise includes simulating active attacks to test the effectiveness of the firewall configurations.

4. Rule Creation and Analysis: Students create a series of firewall rules aimed at protecting a network from various attacks, analyzing the effectiveness of these rules.

5. Scenario Implementation: Implementing a specific scenario provided in the exercise, where students write rules to protect a database from attacks.

6. Reflection and Understanding: Students reflect on the limitations of firewalls in preventing certain types of attacks and consider alternative strategies.

Total Points (0-100):

Understanding and Setup (15 points): Assessing the initial setup and understanding of the firewall tool.

Firewall Configuration (20 points): Grading the ability to configure and modify firewall settings effectively.

Active Attack Analysis (20 points): Evaluating how students handle simulated attacks and their analysis of the firewall’s effectiveness.

Rule Creation and Effectiveness (25 points): Judging the complexity and effectiveness of the firewall rules created by the students.

Scenario Application (10 points): Points for correctly applying the learned concepts to the provided scenario.

Critical Thinking and Reflection (10 points): Assessing the students’ understanding of the limitations of firewalls and alternative strategies.

This distribution ensures a balanced evaluation covering technical skills, analytical thinking, and practical application.

Attached Files (PDF/DOCX): Firewall Exercise ISM 311 V1.docx

Note: Content extraction from these files is restricted, please review them manually.

WRITE MY PAPER