**Please use VMware, Inc. Enterprise , which was used last time** 2-3 pages · Describe threats and vulnerabilities associated with at least two (2) operating systems. List operating system type, threats, and vulnerabilities The goal is not a discussion of using one over the other, it is a discussion of the issues related to each and hardening best practices Many organizations use older Windows server operating systems, mainframe, some Linux and UNIX flavors - infrastructure will be driven by business need and application operability Many are moving to Android/IOS tablet and phone applications, cloud, and Internet-of-thing devices (IoT) See US Cert / NVD Databases for assistance in researching threats and vulnerabilities for different operating systems Describe an anti-malware solution for the organization and indicate on which operating systems it supports. Should be specific to your target company or its environment (legal, compliance, security) List pros/cons for two different types · Select a suitable intrusion detection system (IDS) solution for the organization and explain the reasoning for your suggestion. · Describe at least two (2) control strategies you would consider implementing for securing the company's web-based infrastructure. · Describe at least two (2) control strategies you would consider implementing for securing the company's database infrastructure. · Define two (2) items that you would include in the organization's operating system security hardening procedures. ...