SlideShare a Scribd company logo
1 of 1
Download to read offline
1: List the basic steps in securing an operating system. Assume that the O.S. is being installed for
the first time on new hardware.
Solution
An OS allows different users to access different resources in a shared way. The OS needs to
control the sharing and provide an interface to allow the access. Each layer is impotent to attack
from below if the lower layers are not secured appropriately.
The top four assessments for securing os are:
Most important thing in securing operating system is to secure a base operating system.
The following are the simple steps:

More Related Content

More from tesmondday29076

A blood clot had been silently forming in Adam Parkers left anterio.pdf
A blood clot had been silently forming in Adam Parkers left anterio.pdfA blood clot had been silently forming in Adam Parkers left anterio.pdf
A blood clot had been silently forming in Adam Parkers left anterio.pdf
tesmondday29076
 
what does it takes to be a living organ Assignment Please answer th.pdf
what does it takes to be a living organ Assignment Please answer th.pdfwhat does it takes to be a living organ Assignment Please answer th.pdf
what does it takes to be a living organ Assignment Please answer th.pdf
tesmondday29076
 
What is a SIFI and how does it related to “too big to fail” Describ.pdf
What is a SIFI and how does it related to “too big to fail” Describ.pdfWhat is a SIFI and how does it related to “too big to fail” Describ.pdf
What is a SIFI and how does it related to “too big to fail” Describ.pdf
tesmondday29076
 
TFW LTE 1032 ANM Assignments Position Paper Detail Submission Grade .pdf
TFW LTE 1032 ANM Assignments Position Paper Detail Submission Grade .pdfTFW LTE 1032 ANM Assignments Position Paper Detail Submission Grade .pdf
TFW LTE 1032 ANM Assignments Position Paper Detail Submission Grade .pdf
tesmondday29076
 
please help in microprocessor course (NO handwriting) What is multi-.pdf
please help in microprocessor course (NO handwriting) What is multi-.pdfplease help in microprocessor course (NO handwriting) What is multi-.pdf
please help in microprocessor course (NO handwriting) What is multi-.pdf
tesmondday29076
 
List some applications of surveying in Geology, Forestry, and archeo.pdf
List some applications of surveying in Geology, Forestry, and archeo.pdfList some applications of surveying in Geology, Forestry, and archeo.pdf
List some applications of surveying in Geology, Forestry, and archeo.pdf
tesmondday29076
 
Meningoencephalitis in a 9-year old boy In 2004, a 9 year old boy i.pdf
Meningoencephalitis in a 9-year old boy In 2004, a 9 year old boy i.pdfMeningoencephalitis in a 9-year old boy In 2004, a 9 year old boy i.pdf
Meningoencephalitis in a 9-year old boy In 2004, a 9 year old boy i.pdf
tesmondday29076
 

More from tesmondday29076 (18)

A blood clot had been silently forming in Adam Parkers left anterio.pdf
A blood clot had been silently forming in Adam Parkers left anterio.pdfA blood clot had been silently forming in Adam Parkers left anterio.pdf
A blood clot had been silently forming in Adam Parkers left anterio.pdf
 
what does it takes to be a living organ Assignment Please answer th.pdf
what does it takes to be a living organ Assignment Please answer th.pdfwhat does it takes to be a living organ Assignment Please answer th.pdf
what does it takes to be a living organ Assignment Please answer th.pdf
 
6. How many 6-symbol computer passwords can be formed if the first t.pdf
6. How many 6-symbol computer passwords can be formed if the first t.pdf6. How many 6-symbol computer passwords can be formed if the first t.pdf
6. How many 6-symbol computer passwords can be formed if the first t.pdf
 
What is a SIFI and how does it related to “too big to fail” Describ.pdf
What is a SIFI and how does it related to “too big to fail” Describ.pdfWhat is a SIFI and how does it related to “too big to fail” Describ.pdf
What is a SIFI and how does it related to “too big to fail” Describ.pdf
 
The clade afrotheria includes a diverse variety of species, but are .pdf
The clade afrotheria includes a diverse variety of species, but are .pdfThe clade afrotheria includes a diverse variety of species, but are .pdf
The clade afrotheria includes a diverse variety of species, but are .pdf
 
The enrollment in a certain course is 10 first year students, 30 s.pdf
The enrollment in a certain course is 10 first year students, 30 s.pdfThe enrollment in a certain course is 10 first year students, 30 s.pdf
The enrollment in a certain course is 10 first year students, 30 s.pdf
 
TFW LTE 1032 ANM Assignments Position Paper Detail Submission Grade .pdf
TFW LTE 1032 ANM Assignments Position Paper Detail Submission Grade .pdfTFW LTE 1032 ANM Assignments Position Paper Detail Submission Grade .pdf
TFW LTE 1032 ANM Assignments Position Paper Detail Submission Grade .pdf
 
Summarize the main characteristic of insectsSolution1.Insects .pdf
Summarize the main characteristic of insectsSolution1.Insects .pdfSummarize the main characteristic of insectsSolution1.Insects .pdf
Summarize the main characteristic of insectsSolution1.Insects .pdf
 
Put the following taxonomic hierarchy of classification groups in ord.pdf
Put the following taxonomic hierarchy of classification groups in ord.pdfPut the following taxonomic hierarchy of classification groups in ord.pdf
Put the following taxonomic hierarchy of classification groups in ord.pdf
 
please help in microprocessor course (NO handwriting) What is multi-.pdf
please help in microprocessor course (NO handwriting) What is multi-.pdfplease help in microprocessor course (NO handwriting) What is multi-.pdf
please help in microprocessor course (NO handwriting) What is multi-.pdf
 
List some applications of surveying in Geology, Forestry, and archeo.pdf
List some applications of surveying in Geology, Forestry, and archeo.pdfList some applications of surveying in Geology, Forestry, and archeo.pdf
List some applications of surveying in Geology, Forestry, and archeo.pdf
 
- -0+00- 1+00_ 1+40_ 2 +00 2+40 3+00 Solution1) Chang.pdf
- -0+00- 1+00_ 1+40_ 2 +00 2+40 3+00 Solution1) Chang.pdf- -0+00- 1+00_ 1+40_ 2 +00 2+40 3+00 Solution1) Chang.pdf
- -0+00- 1+00_ 1+40_ 2 +00 2+40 3+00 Solution1) Chang.pdf
 
Multiple choice question-A,B,C or D Air in the cladding yields .pdf
Multiple choice question-A,B,C or D Air in the cladding yields .pdfMultiple choice question-A,B,C or D Air in the cladding yields .pdf
Multiple choice question-A,B,C or D Air in the cladding yields .pdf
 
Nancy can paint a house twice as fast as Terry can. They year they w.pdf
Nancy can paint a house twice as fast as Terry can. They year they w.pdfNancy can paint a house twice as fast as Terry can. They year they w.pdf
Nancy can paint a house twice as fast as Terry can. They year they w.pdf
 
Of the Linux network services introduced in this chapter, DHCP is pr.pdf
Of the Linux network services introduced in this chapter, DHCP is pr.pdfOf the Linux network services introduced in this chapter, DHCP is pr.pdf
Of the Linux network services introduced in this chapter, DHCP is pr.pdf
 
Meningoencephalitis in a 9-year old boy In 2004, a 9 year old boy i.pdf
Meningoencephalitis in a 9-year old boy In 2004, a 9 year old boy i.pdfMeningoencephalitis in a 9-year old boy In 2004, a 9 year old boy i.pdf
Meningoencephalitis in a 9-year old boy In 2004, a 9 year old boy i.pdf
 
in Measurement Of Chlorophyll of the fractionation of the spinach le.pdf
in Measurement Of Chlorophyll of the fractionation of the spinach le.pdfin Measurement Of Chlorophyll of the fractionation of the spinach le.pdf
in Measurement Of Chlorophyll of the fractionation of the spinach le.pdf
 
describe how light moves from outside the eye to the fovea centralis.pdf
describe how light moves from outside the eye to the fovea centralis.pdfdescribe how light moves from outside the eye to the fovea centralis.pdf
describe how light moves from outside the eye to the fovea centralis.pdf
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 

Recently uploaded (20)

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 

1 List the basic steps in securing an operating system. Assume that.pdf

  • 1. 1: List the basic steps in securing an operating system. Assume that the O.S. is being installed for the first time on new hardware. Solution An OS allows different users to access different resources in a shared way. The OS needs to control the sharing and provide an interface to allow the access. Each layer is impotent to attack from below if the lower layers are not secured appropriately. The top four assessments for securing os are: Most important thing in securing operating system is to secure a base operating system. The following are the simple steps: