Explore BrainMass
Share

Operating System Protection

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

Assistance with:
- advantages and disadvantages of at least three different measures used to protect operating systems

- ease of implementation of the measures

- associated security management issues related to measures discussed above.

- ranking of the measures from best to worst with supporting rationale

Please include references

© BrainMass Inc. brainmass.com October 17, 2018, 11:59 am ad1c9bdddf
https://brainmass.com/computer-science/network-security/operating-system-protection-560763

Solution Preview

The simplest measure to protect operating systems is to implement physical security of the computer system itself. By preventing physical access to unauthorized personnel, an organization can protect operating systems. However, the main issue with this measure is that it does not protect the system from other threats, such as network security issues related to virus, trojan, attacks from intruders, etc. It is not a difficult task to implement this measure, but it does not offer complete protection to the OS and just provides physical security to the computer system and the operating system. In today's world, this measure is worst because it fails to protect the system from network security related issues. Physical security, as mentioned above, is simple to implement. One needs to hire security personnel to oversee the physical security of systems. However, the main security management issue is that it still leaves systems vulnerable to network ...

Solution Summary

Discusses advantages and disadvantages of at least three different measures used to protect operating systems.

$2.19
Similar Posting

Advantages and disadvantages of different measures used to protect operating systems

Discuss the relative advantages and disadvantages of at least three different measures used to protect operating systems. The ease of implementation and the associated security management issues should also be addressed.
- What are some measures used for operating systems security?
- What are the different operating systems, and can the security measures be used for each system?

Please also provide some references for this.

View Full Posting Details