Essentials for Computer Operating System Security
Autor: Jeff Reyes • January 31, 2017 • Research Paper • 5,772 Words (24 Pages) • 998 Views
Individual Assignment #1 Essentials for Computer Operating System Security
Jeffrey Reyes
CSEC 630 9081 Prevention and Protection Strategies in Cybersecurity (2158)
University of Maryland University College
Dr. Tsun Chow
Table of Contents
Abstract3
Introduction to Computer Operating Systems4-5
Design of Computer OS Security Measures & Ratings5-7
Cryptography as a Security Measure- Advantages and Disadvantages 7-8
User Authentication: Biometrics- Advantages and Disadvantages 8-11
Firewalls: Advantages and Disadvantages 11-12
IT Security Awareness Training, Polices & Procedures: Advantages and Disadvantages 12-15
Conclusion 15-16
The Security Measures and Severity Rating (table)17
References 19-23
Tables 24-25
Abstract
Attacks against computers, in both home and business environments, have grown steadily over the past several years. According to the U.S. FBI, as cited by Mueller (2003) “worldwide digital attacks reached an all-time high of nearly 20,000 in January, causing more than $8 billion in damages” (Kadel, 2004). Incidents of identity theft – the act of impersonating another person for profit or gain – are growing at an alarming rate. Research as cited by Pollock and May (2002) state that identity theft is considered one of the fastest growing crimes in the United States, affecting an estimated 900,000 new victims every year (Kadel, 2004). The need for information security should be apparent, but the knowledge and ability to design and implement an effective security program requires substantial research, and often a great investment of time and resources (2004). To compound the problem, many home users lack the knowledge and experience to identify and understand their risk (2004). Moreover, while small businesses may understand, they either do not grasp the severity of the problem, or lack the resources to rectify it (2004). Agreeing with Kadel, in examining this issue, numerous topics become ostensible: “1). Incidents of computer related crime are steadily rising”. 2). “Attacks against computers, in both the personal and business arenas, are becoming more sophisticated”. 3). “Software companies, including application and operating system vendors, are unable to keep up with the rapidly growing and ever-changing threat”. 4). “A properly designed and implemented security program can significantly reduce the exposure to these threats, and limit the damage caused in the event of an attack”. 5). “For a security program to remain effective, it must be reviewed and maintained on a regular basis” (2004).
...