SlideShare a Scribd company logo
**Please use VMware, Inc. Enterprise , which was used last
time**
2-3 pages
· Describe threats and vulnerabilities associated with at least
two (2) operating systems.
List operating system type, threats, and vulnerabilities
The goal is not a discussion of using one over the other, it
is a discussion of the issues related to each and hardening
best practices
Many organizations use older Windows server operating
systems, mainframe, some Linux and UNIX flavors -
infrastructure will be driven by business need and
application operability
Many are moving to Android/IOS tablet and phone
applications, cloud, and Internet-of-thing devices (IoT)
See
US Cert
/
NVD
Databases for assistance in researching threats and
vulnerabilities for different operating systems
Describe an anti-malware solution for the organization and
indicate on which operating systems it supports.
Should be specific to your target company or its
environment (legal, compliance, security)
List pros/cons for two different types
· Select a suitable intrusion detection system (IDS) solution for
the organization and explain the reasoning for your suggestion.
· Describe at least two (2) control strategies you would consider
implementing for securing the company's web-based
infrastructure.
· Describe at least two (2) control strategies you would consider
implementing for securing the company's database
infrastructure.
· Define two (2) items that you would include in the
organization's operating system security hardening procedures.

More Related Content

Similar to Please use  VMware, Inc. Enterprise , which was used last time 

Assignment ContentAfter reviewing your latest submission, the .docx
Assignment ContentAfter reviewing your latest submission, the .docxAssignment ContentAfter reviewing your latest submission, the .docx
Assignment ContentAfter reviewing your latest submission, the .docx
williejgrant41084
 
Defense-in-Depth, an IA concept refers to multiple layers of securit.docx
Defense-in-Depth, an IA concept refers to multiple layers of securit.docxDefense-in-Depth, an IA concept refers to multiple layers of securit.docx
Defense-in-Depth, an IA concept refers to multiple layers of securit.docx
vickeryr87
 
Rubric for week 1System model 10 - Provide a scope description .docx
Rubric for week 1System model 10 - Provide a scope description .docxRubric for week 1System model 10 - Provide a scope description .docx
Rubric for week 1System model 10 - Provide a scope description .docx
toddr4
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
WAJAHAT IQBAL
 
Host Based Security Best Practices
Host Based Security Best PracticesHost Based Security Best Practices
Host Based Security Best Practices
webhostingguy
 
Choosing The Right Enterprise Antispyware Solution
Choosing The Right Enterprise Antispyware SolutionChoosing The Right Enterprise Antispyware Solution
Choosing The Right Enterprise Antispyware Solution
Mark J. Feldman
 
Wl security-solutions
Wl security-solutionsWl security-solutions
Wl security-solutions
DefCom Technology
 
Key AssignmentThe management team as well as your peers are happy .docx
Key AssignmentThe management team as well as your peers are happy .docxKey AssignmentThe management team as well as your peers are happy .docx
Key AssignmentThe management team as well as your peers are happy .docx
sleeperfindley
 
Description  Defense-in-Depth, an IA concept refers to multip.docx
Description  Defense-in-Depth, an IA concept refers to multip.docxDescription  Defense-in-Depth, an IA concept refers to multip.docx
Description  Defense-in-Depth, an IA concept refers to multip.docx
carolinef5
 
Description  Defense-in-Depth, an IA concept refers to multip.docx
Description  Defense-in-Depth, an IA concept refers to multip.docxDescription  Defense-in-Depth, an IA concept refers to multip.docx
Description  Defense-in-Depth, an IA concept refers to multip.docx
donaldp2
 
IDS in the Cloud Please respond to the following(a) Explain w.pdf
IDS in the Cloud Please respond to the following(a) Explain w.pdfIDS in the Cloud Please respond to the following(a) Explain w.pdf
IDS in the Cloud Please respond to the following(a) Explain w.pdf
mckenziecast21211
 
The head of the IT security department expressed her concerns ab.docx
The head of the IT security department expressed her concerns ab.docxThe head of the IT security department expressed her concerns ab.docx
The head of the IT security department expressed her concerns ab.docx
karisariddell
 
Using Massively Distributed Malware in APT-Style Attacks
Using Massively Distributed Malware in APT-Style AttacksUsing Massively Distributed Malware in APT-Style Attacks
Using Massively Distributed Malware in APT-Style Attacks
IBM Security
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
Ben Rothke
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
GE코리아
 
Other Systems & Application Software
Other Systems & Application SoftwareOther Systems & Application Software
COM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docxCOM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docx
monicafrancis71118
 
Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server
zOSCommserver
 
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEETESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
ESET Belgique & Luxembourg
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
IRJET Journal
 

Similar to Please use  VMware, Inc. Enterprise , which was used last time  (20)

Assignment ContentAfter reviewing your latest submission, the .docx
Assignment ContentAfter reviewing your latest submission, the .docxAssignment ContentAfter reviewing your latest submission, the .docx
Assignment ContentAfter reviewing your latest submission, the .docx
 
Defense-in-Depth, an IA concept refers to multiple layers of securit.docx
Defense-in-Depth, an IA concept refers to multiple layers of securit.docxDefense-in-Depth, an IA concept refers to multiple layers of securit.docx
Defense-in-Depth, an IA concept refers to multiple layers of securit.docx
 
Rubric for week 1System model 10 - Provide a scope description .docx
Rubric for week 1System model 10 - Provide a scope description .docxRubric for week 1System model 10 - Provide a scope description .docx
Rubric for week 1System model 10 - Provide a scope description .docx
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
 
Host Based Security Best Practices
Host Based Security Best PracticesHost Based Security Best Practices
Host Based Security Best Practices
 
Choosing The Right Enterprise Antispyware Solution
Choosing The Right Enterprise Antispyware SolutionChoosing The Right Enterprise Antispyware Solution
Choosing The Right Enterprise Antispyware Solution
 
Wl security-solutions
Wl security-solutionsWl security-solutions
Wl security-solutions
 
Key AssignmentThe management team as well as your peers are happy .docx
Key AssignmentThe management team as well as your peers are happy .docxKey AssignmentThe management team as well as your peers are happy .docx
Key AssignmentThe management team as well as your peers are happy .docx
 
Description  Defense-in-Depth, an IA concept refers to multip.docx
Description  Defense-in-Depth, an IA concept refers to multip.docxDescription  Defense-in-Depth, an IA concept refers to multip.docx
Description  Defense-in-Depth, an IA concept refers to multip.docx
 
Description  Defense-in-Depth, an IA concept refers to multip.docx
Description  Defense-in-Depth, an IA concept refers to multip.docxDescription  Defense-in-Depth, an IA concept refers to multip.docx
Description  Defense-in-Depth, an IA concept refers to multip.docx
 
IDS in the Cloud Please respond to the following(a) Explain w.pdf
IDS in the Cloud Please respond to the following(a) Explain w.pdfIDS in the Cloud Please respond to the following(a) Explain w.pdf
IDS in the Cloud Please respond to the following(a) Explain w.pdf
 
The head of the IT security department expressed her concerns ab.docx
The head of the IT security department expressed her concerns ab.docxThe head of the IT security department expressed her concerns ab.docx
The head of the IT security department expressed her concerns ab.docx
 
Using Massively Distributed Malware in APT-Style Attacks
Using Massively Distributed Malware in APT-Style AttacksUsing Massively Distributed Malware in APT-Style Attacks
Using Massively Distributed Malware in APT-Style Attacks
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Other Systems & Application Software
Other Systems & Application SoftwareOther Systems & Application Software
Other Systems & Application Software
 
COM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docxCOM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docx
 
Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server
 
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEETESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 

More from lascellesjaimie

Bluestone Company had three intangible assets at the end of 2014 (en.docx
Bluestone Company had three intangible assets at the end of 2014 (en.docxBluestone Company had three intangible assets at the end of 2014 (en.docx
Bluestone Company had three intangible assets at the end of 2014 (en.docx
lascellesjaimie
 
BIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docx
BIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docxBIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docx
BIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docx
lascellesjaimie
 
Bluestone Copany had three intangible assets at the end of the curre.docx
Bluestone Copany had three intangible assets at the end of the curre.docxBluestone Copany had three intangible assets at the end of the curre.docx
Bluestone Copany had three intangible assets at the end of the curre.docx
lascellesjaimie
 
Biology 110 Online Evolution labStudent Directions1.Go .docx
Biology 110 Online Evolution labStudent Directions1.Go .docxBiology 110 Online Evolution labStudent Directions1.Go .docx
Biology 110 Online Evolution labStudent Directions1.Go .docx
lascellesjaimie
 
Biological Psychology WorksheetAnswer the following questions wi.docx
Biological Psychology WorksheetAnswer the following questions wi.docxBiological Psychology WorksheetAnswer the following questions wi.docx
Biological Psychology WorksheetAnswer the following questions wi.docx
lascellesjaimie
 
Biodiversity hotspots are one conservation strategy used to direct f.docx
Biodiversity hotspots are one conservation strategy used to direct f.docxBiodiversity hotspots are one conservation strategy used to direct f.docx
Biodiversity hotspots are one conservation strategy used to direct f.docx
lascellesjaimie
 
BIO9 Human Biology Term ProjectGoals1. Being able to understand.docx
BIO9 Human Biology Term ProjectGoals1. Being able to understand.docxBIO9 Human Biology Term ProjectGoals1. Being able to understand.docx
BIO9 Human Biology Term ProjectGoals1. Being able to understand.docx
lascellesjaimie
 
Bill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docxBill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docx
lascellesjaimie
 
Biotechnology ApplicationsBiotechnology refers to the technical ap.docx
Biotechnology ApplicationsBiotechnology refers to the technical ap.docxBiotechnology ApplicationsBiotechnology refers to the technical ap.docx
Biotechnology ApplicationsBiotechnology refers to the technical ap.docx
lascellesjaimie
 
Bios of 20 Important WomenStudents will be required to complete bi.docx
Bios of 20 Important WomenStudents will be required to complete bi.docxBios of 20 Important WomenStudents will be required to complete bi.docx
Bios of 20 Important WomenStudents will be required to complete bi.docx
lascellesjaimie
 
Biomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docx
Biomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docxBiomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docx
Biomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docx
lascellesjaimie
 
Biology 110 Online Evolution lab Student Directions 1.    Go to htt.docx
Biology 110 Online Evolution lab Student Directions 1.    Go to htt.docxBiology 110 Online Evolution lab Student Directions 1.    Go to htt.docx
Biology 110 Online Evolution lab Student Directions 1.    Go to htt.docx
lascellesjaimie
 
Biblical Worldview Essay InstructionsRationale for the Biblical .docx
Biblical Worldview Essay InstructionsRationale for the Biblical .docxBiblical Worldview Essay InstructionsRationale for the Biblical .docx
Biblical Worldview Essay InstructionsRationale for the Biblical .docx
lascellesjaimie
 
Biblical passaes 2 Samuel 13 1-22 looking for similarity between tw.docx
Biblical passaes 2 Samuel 13 1-22 looking for similarity between tw.docxBiblical passaes 2 Samuel 13 1-22 looking for similarity between tw.docx
Biblical passaes 2 Samuel 13 1-22 looking for similarity between tw.docx
lascellesjaimie
 
Benefits of Nongoverning Volunteer Orientation and TrainingBoard G.docx
Benefits of Nongoverning Volunteer Orientation and TrainingBoard G.docxBenefits of Nongoverning Volunteer Orientation and TrainingBoard G.docx
Benefits of Nongoverning Volunteer Orientation and TrainingBoard G.docx
lascellesjaimie
 
Bernard Madoff, a once highly regarded member of the Wall Street c.docx
Bernard Madoff, a once highly regarded member of the Wall Street c.docxBernard Madoff, a once highly regarded member of the Wall Street c.docx
Bernard Madoff, a once highly regarded member of the Wall Street c.docx
lascellesjaimie
 
Benefits of a Diverse WorkforceCommunication is of utmost import.docx
Benefits of a Diverse WorkforceCommunication is of utmost import.docxBenefits of a Diverse WorkforceCommunication is of utmost import.docx
Benefits of a Diverse WorkforceCommunication is of utmost import.docx
lascellesjaimie
 
Benchmark - Evidence-Based Practice Project—Paper on Diabetes .docx
Benchmark - Evidence-Based Practice Project—Paper on Diabetes .docxBenchmark - Evidence-Based Practice Project—Paper on Diabetes .docx
Benchmark - Evidence-Based Practice Project—Paper on Diabetes .docx
lascellesjaimie
 
Below I attached the instructions and requirements for this paper..docx
Below I attached the instructions and requirements for this paper..docxBelow I attached the instructions and requirements for this paper..docx
Below I attached the instructions and requirements for this paper..docx
lascellesjaimie
 
Below is 4 questions that I need answered. I usually just get other .docx
Below is 4 questions that I need answered. I usually just get other .docxBelow is 4 questions that I need answered. I usually just get other .docx
Below is 4 questions that I need answered. I usually just get other .docx
lascellesjaimie
 

More from lascellesjaimie (20)

Bluestone Company had three intangible assets at the end of 2014 (en.docx
Bluestone Company had three intangible assets at the end of 2014 (en.docxBluestone Company had three intangible assets at the end of 2014 (en.docx
Bluestone Company had three intangible assets at the end of 2014 (en.docx
 
BIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docx
BIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docxBIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docx
BIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docx
 
Bluestone Copany had three intangible assets at the end of the curre.docx
Bluestone Copany had three intangible assets at the end of the curre.docxBluestone Copany had three intangible assets at the end of the curre.docx
Bluestone Copany had three intangible assets at the end of the curre.docx
 
Biology 110 Online Evolution labStudent Directions1.Go .docx
Biology 110 Online Evolution labStudent Directions1.Go .docxBiology 110 Online Evolution labStudent Directions1.Go .docx
Biology 110 Online Evolution labStudent Directions1.Go .docx
 
Biological Psychology WorksheetAnswer the following questions wi.docx
Biological Psychology WorksheetAnswer the following questions wi.docxBiological Psychology WorksheetAnswer the following questions wi.docx
Biological Psychology WorksheetAnswer the following questions wi.docx
 
Biodiversity hotspots are one conservation strategy used to direct f.docx
Biodiversity hotspots are one conservation strategy used to direct f.docxBiodiversity hotspots are one conservation strategy used to direct f.docx
Biodiversity hotspots are one conservation strategy used to direct f.docx
 
BIO9 Human Biology Term ProjectGoals1. Being able to understand.docx
BIO9 Human Biology Term ProjectGoals1. Being able to understand.docxBIO9 Human Biology Term ProjectGoals1. Being able to understand.docx
BIO9 Human Biology Term ProjectGoals1. Being able to understand.docx
 
Bill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docxBill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docx
 
Biotechnology ApplicationsBiotechnology refers to the technical ap.docx
Biotechnology ApplicationsBiotechnology refers to the technical ap.docxBiotechnology ApplicationsBiotechnology refers to the technical ap.docx
Biotechnology ApplicationsBiotechnology refers to the technical ap.docx
 
Bios of 20 Important WomenStudents will be required to complete bi.docx
Bios of 20 Important WomenStudents will be required to complete bi.docxBios of 20 Important WomenStudents will be required to complete bi.docx
Bios of 20 Important WomenStudents will be required to complete bi.docx
 
Biomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docx
Biomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docxBiomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docx
Biomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docx
 
Biology 110 Online Evolution lab Student Directions 1.    Go to htt.docx
Biology 110 Online Evolution lab Student Directions 1.    Go to htt.docxBiology 110 Online Evolution lab Student Directions 1.    Go to htt.docx
Biology 110 Online Evolution lab Student Directions 1.    Go to htt.docx
 
Biblical Worldview Essay InstructionsRationale for the Biblical .docx
Biblical Worldview Essay InstructionsRationale for the Biblical .docxBiblical Worldview Essay InstructionsRationale for the Biblical .docx
Biblical Worldview Essay InstructionsRationale for the Biblical .docx
 
Biblical passaes 2 Samuel 13 1-22 looking for similarity between tw.docx
Biblical passaes 2 Samuel 13 1-22 looking for similarity between tw.docxBiblical passaes 2 Samuel 13 1-22 looking for similarity between tw.docx
Biblical passaes 2 Samuel 13 1-22 looking for similarity between tw.docx
 
Benefits of Nongoverning Volunteer Orientation and TrainingBoard G.docx
Benefits of Nongoverning Volunteer Orientation and TrainingBoard G.docxBenefits of Nongoverning Volunteer Orientation and TrainingBoard G.docx
Benefits of Nongoverning Volunteer Orientation and TrainingBoard G.docx
 
Bernard Madoff, a once highly regarded member of the Wall Street c.docx
Bernard Madoff, a once highly regarded member of the Wall Street c.docxBernard Madoff, a once highly regarded member of the Wall Street c.docx
Bernard Madoff, a once highly regarded member of the Wall Street c.docx
 
Benefits of a Diverse WorkforceCommunication is of utmost import.docx
Benefits of a Diverse WorkforceCommunication is of utmost import.docxBenefits of a Diverse WorkforceCommunication is of utmost import.docx
Benefits of a Diverse WorkforceCommunication is of utmost import.docx
 
Benchmark - Evidence-Based Practice Project—Paper on Diabetes .docx
Benchmark - Evidence-Based Practice Project—Paper on Diabetes .docxBenchmark - Evidence-Based Practice Project—Paper on Diabetes .docx
Benchmark - Evidence-Based Practice Project—Paper on Diabetes .docx
 
Below I attached the instructions and requirements for this paper..docx
Below I attached the instructions and requirements for this paper..docxBelow I attached the instructions and requirements for this paper..docx
Below I attached the instructions and requirements for this paper..docx
 
Below is 4 questions that I need answered. I usually just get other .docx
Below is 4 questions that I need answered. I usually just get other .docxBelow is 4 questions that I need answered. I usually just get other .docx
Below is 4 questions that I need answered. I usually just get other .docx
 

Recently uploaded

C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 

Recently uploaded (20)

C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 

Please use  VMware, Inc. Enterprise , which was used last time 

  • 1. **Please use VMware, Inc. Enterprise , which was used last time** 2-3 pages · Describe threats and vulnerabilities associated with at least two (2) operating systems. List operating system type, threats, and vulnerabilities The goal is not a discussion of using one over the other, it is a discussion of the issues related to each and hardening best practices Many organizations use older Windows server operating systems, mainframe, some Linux and UNIX flavors - infrastructure will be driven by business need and application operability Many are moving to Android/IOS tablet and phone applications, cloud, and Internet-of-thing devices (IoT) See US Cert / NVD Databases for assistance in researching threats and vulnerabilities for different operating systems Describe an anti-malware solution for the organization and indicate on which operating systems it supports.
  • 2. Should be specific to your target company or its environment (legal, compliance, security) List pros/cons for two different types · Select a suitable intrusion detection system (IDS) solution for the organization and explain the reasoning for your suggestion. · Describe at least two (2) control strategies you would consider implementing for securing the company's web-based infrastructure. · Describe at least two (2) control strategies you would consider implementing for securing the company's database infrastructure. · Define two (2) items that you would include in the organization's operating system security hardening procedures.