Operating System Vulnerabilities
Overview
For this assignment, Conduct a thorough risk analysis in an operating system
of your choice. Look at common vulnerabilities, such as malware, data leaks,
and unauthorized access, and identify the risks they present to your users
and your systems.
Once you’ve identified these vulnerabilities, create a step-by-step guide
outlining best practices and strategies to protect against them.
You’ll want to make sure you’re taking proactive steps, such as regularly
updating your system and implementing strong authentication, but you’ll
also want to look at how users can develop a security mindset when
interacting with their operating system.
Instructions
The objective of this assignment is to reflect on your understanding of
operating system risks and vulnerabilities and learn about the practices used
against them. Submit a PowerPoint presentation demonstrating this. Make
sure you meet the minimum requirements of:
List the operating system of your choice
List at least 2 vulnerabilities in the operating system
Explain step by step how to protect against each one
Citing your information. Citation must include:
Using at least three valid resources from articles posted in peer
reviewed journals.
Using at least two web sites.
For reference, check out Maryville Library's Citation HelpLinks to an
external site.
as needed.