Part 1: List the basic steps in securing an operating system. Assume that the O.S. is being installed for the first time on new hardware. Part 2: Name and briefly describe two ways that college students could be recruited into illegal espionage. Part 3: Explain the function of the trusted boot function of the trusted platform module (TPM.) Tell how that is related to the current controversy between Apple and the FBI concerning encryption. What could the FBI do in the absence of a trusted boot function? Part 4: Define single loss exposure and annualized risk of occurrence. Explain in your own words what these have to do with computer security. Part 5: Explain why it is important to monitor outbound traffic as well as inbound traffic in a corporate network. Give an example Solution Part1:- There are three things that can enhance operating system security across an enterprise network: First, provisioning of the servers on the network should be done once in one place, involving the roughly tens of separate configurations most organizations require. This image, or set of images, can then be downloaded across the network, with the help of software that automates this process and eliminates the pain of doing it manually for each server. Moreover, even if you had an instruction sheet for these key configurations, you wouldn\'t want local administrators to access these key configurations for each server, which is very dangerous. The best way to do it is once and for all. Once the network has been provisioned, administrators need to be able to verify policy compliance, which defines user access rights and ensures that all configurations are correct. An agent running on the network or remotely can monitor each server continuously, and such monitoring wouldn\'t interfere with normal operations. Second, account management needs to be centralized to control access to the network and to ensure that users have appropriate access to enterprise resources. Policies, rules and intelligence should be located in one place—not on each box—and should be pushed out from there to provision user systems with correct IDs and permissions. An ID life cycle manager can be used to automate this process and reduce the pain of doing this manually. Third, the operating system should be configured so that it can be used to monitor activity on the network easily and efficiently—revealing who is and isn\'t making connections, as well as pointing out potential security events coming out of the operating system. Administrators can use a central dashboard that monitors these events in real time and alerts them to serious problems based on preset correlations and filtering. Just as important, this monitoring system should be set up so that administrators aren\'t overwhelmed by routine events that don\'t jeopardize network security. Part2:- Two ways that college students could be recruited into illegal espionage: First, the students may be trend before they sending out to the foreign .