SlideShare a Scribd company logo
Q-1: The importance of securing your operating system and software. Security and Protection
requires that computer resources such as CPU, software, memory etc. are protected. You will
need to mention the importance. Below are the following that you need to format your report: Pls
complete based on these requirements: 1. Have at least 4 references 2. Approximately 900 words
Report - Introduction - Contents (at least 4 facts with explanation) - Securing operating systems
can include any of the following: - The use of antivirus software and other endpoint protection
measures, - Regular OS patch updates, - A firewall for monitoring network traffic, - Enforcement
of secure access through least privileges and user controls - Securing software can include any of
the following: - Software so that it is working as it is supposed to - Data processed by the
software with correct outcome - How the software handles errors - Conclusion Reference (at
least 4 references)

More Related Content

Similar to Q-1- The importance of securing your operating system and software- Se.docx

Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
ManageEngine, Zoho Corporation
 
Roll of os
Roll of osRoll of os
Roll of os
Fazla Rabbi
 
AIX Advanced Administration Knowledge Share
AIX Advanced Administration Knowledge ShareAIX Advanced Administration Knowledge Share
AIX Advanced Administration Knowledge Share
.Gastón. .Bx.
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
BabyBoy55
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnetrosu555
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
Duressa Teshome
 
Connecting hw peripheral Presentation1.pptx
Connecting hw peripheral Presentation1.pptxConnecting hw peripheral Presentation1.pptx
Connecting hw peripheral Presentation1.pptx
AdilKedir2
 
Software.pptx
Software.pptxSoftware.pptx
Software.pptx
RabiaAsif31
 
Eman,scrsots
Eman,scrsotsEman,scrsots
Eman,scrsotsquadsols
 
Operating system
Operating systemOperating system
Operating systemArchit Garg
 
Operating system
Operating systemOperating system
Operating system
Archit Garg
 
Operating systems introduction
Operating systems   introductionOperating systems   introduction
Operating systems introduction
veeravanithaD
 
Mentain Inv Hw & SW documentation for HNS-I.pptx
Mentain Inv Hw & SW documentation for HNS-I.pptxMentain Inv Hw & SW documentation for HNS-I.pptx
Mentain Inv Hw & SW documentation for HNS-I.pptx
ReshidJewar
 
Aud5_Chapter-26.pptx
Aud5_Chapter-26.pptxAud5_Chapter-26.pptx
Aud5_Chapter-26.pptx
JayLloyd8
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
AssadLeo1
 
Chapter 1 Introduction to Operating System Concepts
Chapter 1 Introduction to Operating System ConceptsChapter 1 Introduction to Operating System Concepts
Chapter 1 Introduction to Operating System Concepts
MeenalJabde
 
installing and optimizing operating system software
installing and optimizing operating system software   installing and optimizing operating system software
installing and optimizing operating system software
Jaleto Sunkemo
 
Cisco Next-Generation IPS and how to install Firepower version 6.X.pptx
Cisco Next-Generation IPS and how to install Firepower version 6.X.pptxCisco Next-Generation IPS and how to install Firepower version 6.X.pptx
Cisco Next-Generation IPS and how to install Firepower version 6.X.pptx
zachdwg
 

Similar to Q-1- The importance of securing your operating system and software- Se.docx (20)

Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
 
Roll of os
Roll of osRoll of os
Roll of os
 
Roll of os
Roll of osRoll of os
Roll of os
 
AIX Advanced Administration Knowledge Share
AIX Advanced Administration Knowledge ShareAIX Advanced Administration Knowledge Share
AIX Advanced Administration Knowledge Share
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnet
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Connecting hw peripheral Presentation1.pptx
Connecting hw peripheral Presentation1.pptxConnecting hw peripheral Presentation1.pptx
Connecting hw peripheral Presentation1.pptx
 
Software.pptx
Software.pptxSoftware.pptx
Software.pptx
 
Week 01.pdf
Week 01.pdfWeek 01.pdf
Week 01.pdf
 
Eman,scrsots
Eman,scrsotsEman,scrsots
Eman,scrsots
 
Operating system
Operating systemOperating system
Operating system
 
Operating system
Operating systemOperating system
Operating system
 
Operating systems introduction
Operating systems   introductionOperating systems   introduction
Operating systems introduction
 
Mentain Inv Hw & SW documentation for HNS-I.pptx
Mentain Inv Hw & SW documentation for HNS-I.pptxMentain Inv Hw & SW documentation for HNS-I.pptx
Mentain Inv Hw & SW documentation for HNS-I.pptx
 
Aud5_Chapter-26.pptx
Aud5_Chapter-26.pptxAud5_Chapter-26.pptx
Aud5_Chapter-26.pptx
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
 
Chapter 1 Introduction to Operating System Concepts
Chapter 1 Introduction to Operating System ConceptsChapter 1 Introduction to Operating System Concepts
Chapter 1 Introduction to Operating System Concepts
 
installing and optimizing operating system software
installing and optimizing operating system software   installing and optimizing operating system software
installing and optimizing operating system software
 
Cisco Next-Generation IPS and how to install Firepower version 6.X.pptx
Cisco Next-Generation IPS and how to install Firepower version 6.X.pptxCisco Next-Generation IPS and how to install Firepower version 6.X.pptx
Cisco Next-Generation IPS and how to install Firepower version 6.X.pptx
 

More from VictormxrPiperc

Problem 3- -8 points- A particular Humane Society has 3 kinds of anima.docx
Problem 3- -8 points- A particular Humane Society has 3 kinds of anima.docxProblem 3- -8 points- A particular Humane Society has 3 kinds of anima.docx
Problem 3- -8 points- A particular Humane Society has 3 kinds of anima.docx
VictormxrPiperc
 
Q-2- The following events and their probabilities are listed below- (a.docx
Q-2- The following events and their probabilities are listed below- (a.docxQ-2- The following events and their probabilities are listed below- (a.docx
Q-2- The following events and their probabilities are listed below- (a.docx
VictormxrPiperc
 
Q-2-2 Inputs are resources that are used directly to create goods and.docx
Q-2-2 Inputs are resources that are used directly to create goods and.docxQ-2-2 Inputs are resources that are used directly to create goods and.docx
Q-2-2 Inputs are resources that are used directly to create goods and.docx
VictormxrPiperc
 
q-1p x1-x2-x3 Normal distribution A measure of the spread or variabili.docx
q-1p x1-x2-x3 Normal distribution A measure of the spread or variabili.docxq-1p x1-x2-x3 Normal distribution A measure of the spread or variabili.docx
q-1p x1-x2-x3 Normal distribution A measure of the spread or variabili.docx
VictormxrPiperc
 
Q- Mutations in ftsZ (encoding the FtsZ protein) cause a filamentous c.docx
Q- Mutations in ftsZ (encoding the FtsZ protein) cause a filamentous c.docxQ- Mutations in ftsZ (encoding the FtsZ protein) cause a filamentous c.docx
Q- Mutations in ftsZ (encoding the FtsZ protein) cause a filamentous c.docx
VictormxrPiperc
 
Python- Define a function- access()- that captures two values- user na.docx
Python- Define a function- access()- that captures two values- user na.docxPython- Define a function- access()- that captures two values- user na.docx
Python- Define a function- access()- that captures two values- user na.docx
VictormxrPiperc
 
PYTHON PLZ Write a program whose inputs are three integers- and whose.docx
PYTHON PLZ Write a program whose inputs are three integers- and whose.docxPYTHON PLZ Write a program whose inputs are three integers- and whose.docx
PYTHON PLZ Write a program whose inputs are three integers- and whose.docx
VictormxrPiperc
 
PYTHON PLZ Write a program with total change amount as an integer inp.docx
PYTHON PLZ  Write a program with total change amount as an integer inp.docxPYTHON PLZ  Write a program with total change amount as an integer inp.docx
PYTHON PLZ Write a program with total change amount as an integer inp.docx
VictormxrPiperc
 
PYTHON ONLY--- LOOP IS NOT ALLOWED ONLY IF-ELSE ELIF DO-NT USE NOT LIK.docx
PYTHON ONLY--- LOOP IS NOT ALLOWED ONLY IF-ELSE ELIF DO-NT USE NOT LIK.docxPYTHON ONLY--- LOOP IS NOT ALLOWED ONLY IF-ELSE ELIF DO-NT USE NOT LIK.docx
PYTHON ONLY--- LOOP IS NOT ALLOWED ONLY IF-ELSE ELIF DO-NT USE NOT LIK.docx
VictormxrPiperc
 
Pull a minimum of three strategies from the Elements of Ethics and sha.docx
Pull a minimum of three strategies from the Elements of Ethics and sha.docxPull a minimum of three strategies from the Elements of Ethics and sha.docx
Pull a minimum of three strategies from the Elements of Ethics and sha.docx
VictormxrPiperc
 
Put the methods in the cosmic distance ladder in order based on the ma.docx
Put the methods in the cosmic distance ladder in order based on the ma.docxPut the methods in the cosmic distance ladder in order based on the ma.docx
Put the methods in the cosmic distance ladder in order based on the ma.docx
VictormxrPiperc
 
Put the steps of Ocean Acidification in order- Ocean pH drops- making.docx
Put the steps of Ocean Acidification in order- Ocean pH drops- making.docxPut the steps of Ocean Acidification in order- Ocean pH drops- making.docx
Put the steps of Ocean Acidification in order- Ocean pH drops- making.docx
VictormxrPiperc
 
public class SortModule { private static int-- getFirstHalf(int--.docx
public class SortModule {      private static int-- getFirstHalf(int--.docxpublic class SortModule {      private static int-- getFirstHalf(int--.docx
public class SortModule { private static int-- getFirstHalf(int--.docx
VictormxrPiperc
 
Purnell Industries had the following account balances at 12-31-20 (the.docx
Purnell Industries had the following account balances at 12-31-20 (the.docxPurnell Industries had the following account balances at 12-31-20 (the.docx
Purnell Industries had the following account balances at 12-31-20 (the.docx
VictormxrPiperc
 
Provide IUPAC name for the product in the reaction below Br2 hv.docx
Provide IUPAC name for the product in the reaction below    Br2 hv.docxProvide IUPAC name for the product in the reaction below    Br2 hv.docx
Provide IUPAC name for the product in the reaction below Br2 hv.docx
VictormxrPiperc
 
pte_t -FUNCTION(unsigned int page) -{ unsigned int vpn- -- Virtual Pag.docx
pte_t -FUNCTION(unsigned int page) -{ unsigned int vpn- -- Virtual Pag.docxpte_t -FUNCTION(unsigned int page) -{ unsigned int vpn- -- Virtual Pag.docx
pte_t -FUNCTION(unsigned int page) -{ unsigned int vpn- -- Virtual Pag.docx
VictormxrPiperc
 
provide an executive summary of how senior management should interact.docx
provide an executive summary of how senior management should interact.docxprovide an executive summary of how senior management should interact.docx
provide an executive summary of how senior management should interact.docx
VictormxrPiperc
 
Provide brief Answers to the following Questions- 1- What is data proc.docx
Provide brief Answers to the following Questions- 1- What is data proc.docxProvide brief Answers to the following Questions- 1- What is data proc.docx
Provide brief Answers to the following Questions- 1- What is data proc.docx
VictormxrPiperc
 
protostar giants white dwarfs fusion of H into He.docx
protostar giants white dwarfs fusion of H into He.docxprotostar giants white dwarfs fusion of H into He.docx
protostar giants white dwarfs fusion of H into He.docx
VictormxrPiperc
 
Protein synthesis in bacteria Requires only the start site and the rib (1).docx
Protein synthesis in bacteria Requires only the start site and the rib (1).docxProtein synthesis in bacteria Requires only the start site and the rib (1).docx
Protein synthesis in bacteria Requires only the start site and the rib (1).docx
VictormxrPiperc
 

More from VictormxrPiperc (20)

Problem 3- -8 points- A particular Humane Society has 3 kinds of anima.docx
Problem 3- -8 points- A particular Humane Society has 3 kinds of anima.docxProblem 3- -8 points- A particular Humane Society has 3 kinds of anima.docx
Problem 3- -8 points- A particular Humane Society has 3 kinds of anima.docx
 
Q-2- The following events and their probabilities are listed below- (a.docx
Q-2- The following events and their probabilities are listed below- (a.docxQ-2- The following events and their probabilities are listed below- (a.docx
Q-2- The following events and their probabilities are listed below- (a.docx
 
Q-2-2 Inputs are resources that are used directly to create goods and.docx
Q-2-2 Inputs are resources that are used directly to create goods and.docxQ-2-2 Inputs are resources that are used directly to create goods and.docx
Q-2-2 Inputs are resources that are used directly to create goods and.docx
 
q-1p x1-x2-x3 Normal distribution A measure of the spread or variabili.docx
q-1p x1-x2-x3 Normal distribution A measure of the spread or variabili.docxq-1p x1-x2-x3 Normal distribution A measure of the spread or variabili.docx
q-1p x1-x2-x3 Normal distribution A measure of the spread or variabili.docx
 
Q- Mutations in ftsZ (encoding the FtsZ protein) cause a filamentous c.docx
Q- Mutations in ftsZ (encoding the FtsZ protein) cause a filamentous c.docxQ- Mutations in ftsZ (encoding the FtsZ protein) cause a filamentous c.docx
Q- Mutations in ftsZ (encoding the FtsZ protein) cause a filamentous c.docx
 
Python- Define a function- access()- that captures two values- user na.docx
Python- Define a function- access()- that captures two values- user na.docxPython- Define a function- access()- that captures two values- user na.docx
Python- Define a function- access()- that captures two values- user na.docx
 
PYTHON PLZ Write a program whose inputs are three integers- and whose.docx
PYTHON PLZ Write a program whose inputs are three integers- and whose.docxPYTHON PLZ Write a program whose inputs are three integers- and whose.docx
PYTHON PLZ Write a program whose inputs are three integers- and whose.docx
 
PYTHON PLZ Write a program with total change amount as an integer inp.docx
PYTHON PLZ  Write a program with total change amount as an integer inp.docxPYTHON PLZ  Write a program with total change amount as an integer inp.docx
PYTHON PLZ Write a program with total change amount as an integer inp.docx
 
PYTHON ONLY--- LOOP IS NOT ALLOWED ONLY IF-ELSE ELIF DO-NT USE NOT LIK.docx
PYTHON ONLY--- LOOP IS NOT ALLOWED ONLY IF-ELSE ELIF DO-NT USE NOT LIK.docxPYTHON ONLY--- LOOP IS NOT ALLOWED ONLY IF-ELSE ELIF DO-NT USE NOT LIK.docx
PYTHON ONLY--- LOOP IS NOT ALLOWED ONLY IF-ELSE ELIF DO-NT USE NOT LIK.docx
 
Pull a minimum of three strategies from the Elements of Ethics and sha.docx
Pull a minimum of three strategies from the Elements of Ethics and sha.docxPull a minimum of three strategies from the Elements of Ethics and sha.docx
Pull a minimum of three strategies from the Elements of Ethics and sha.docx
 
Put the methods in the cosmic distance ladder in order based on the ma.docx
Put the methods in the cosmic distance ladder in order based on the ma.docxPut the methods in the cosmic distance ladder in order based on the ma.docx
Put the methods in the cosmic distance ladder in order based on the ma.docx
 
Put the steps of Ocean Acidification in order- Ocean pH drops- making.docx
Put the steps of Ocean Acidification in order- Ocean pH drops- making.docxPut the steps of Ocean Acidification in order- Ocean pH drops- making.docx
Put the steps of Ocean Acidification in order- Ocean pH drops- making.docx
 
public class SortModule { private static int-- getFirstHalf(int--.docx
public class SortModule {      private static int-- getFirstHalf(int--.docxpublic class SortModule {      private static int-- getFirstHalf(int--.docx
public class SortModule { private static int-- getFirstHalf(int--.docx
 
Purnell Industries had the following account balances at 12-31-20 (the.docx
Purnell Industries had the following account balances at 12-31-20 (the.docxPurnell Industries had the following account balances at 12-31-20 (the.docx
Purnell Industries had the following account balances at 12-31-20 (the.docx
 
Provide IUPAC name for the product in the reaction below Br2 hv.docx
Provide IUPAC name for the product in the reaction below    Br2 hv.docxProvide IUPAC name for the product in the reaction below    Br2 hv.docx
Provide IUPAC name for the product in the reaction below Br2 hv.docx
 
pte_t -FUNCTION(unsigned int page) -{ unsigned int vpn- -- Virtual Pag.docx
pte_t -FUNCTION(unsigned int page) -{ unsigned int vpn- -- Virtual Pag.docxpte_t -FUNCTION(unsigned int page) -{ unsigned int vpn- -- Virtual Pag.docx
pte_t -FUNCTION(unsigned int page) -{ unsigned int vpn- -- Virtual Pag.docx
 
provide an executive summary of how senior management should interact.docx
provide an executive summary of how senior management should interact.docxprovide an executive summary of how senior management should interact.docx
provide an executive summary of how senior management should interact.docx
 
Provide brief Answers to the following Questions- 1- What is data proc.docx
Provide brief Answers to the following Questions- 1- What is data proc.docxProvide brief Answers to the following Questions- 1- What is data proc.docx
Provide brief Answers to the following Questions- 1- What is data proc.docx
 
protostar giants white dwarfs fusion of H into He.docx
protostar giants white dwarfs fusion of H into He.docxprotostar giants white dwarfs fusion of H into He.docx
protostar giants white dwarfs fusion of H into He.docx
 
Protein synthesis in bacteria Requires only the start site and the rib (1).docx
Protein synthesis in bacteria Requires only the start site and the rib (1).docxProtein synthesis in bacteria Requires only the start site and the rib (1).docx
Protein synthesis in bacteria Requires only the start site and the rib (1).docx
 

Recently uploaded

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 

Recently uploaded (20)

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 

Q-1- The importance of securing your operating system and software- Se.docx

  • 1. Q-1: The importance of securing your operating system and software. Security and Protection requires that computer resources such as CPU, software, memory etc. are protected. You will need to mention the importance. Below are the following that you need to format your report: Pls complete based on these requirements: 1. Have at least 4 references 2. Approximately 900 words Report - Introduction - Contents (at least 4 facts with explanation) - Securing operating systems can include any of the following: - The use of antivirus software and other endpoint protection measures, - Regular OS patch updates, - A firewall for monitoring network traffic, - Enforcement of secure access through least privileges and user controls - Securing software can include any of the following: - Software so that it is working as it is supposed to - Data processed by the software with correct outcome - How the software handles errors - Conclusion Reference (at least 4 references)