For this assessment, you will explain how to secure your applications and operating systems using various security tools. Use the suggested resources, the Capella library, and the Internet to research the subject matter.
Describe threats and vulnerabilities associated with at least two operating systems.
Describe an anti-malware solution for the organization and indicate on which operating systems it supports.
Select a suitable intrusion detection system (IDS) solution for the organization and explain the reasons for your suggestion.
Describe at least two control strategies that you would consider implementing for securing the company’s Web-based infrastructure.
Describe at least two control strategies that you would consider implementing for securing the company’s database infrastructure.
Define two items that you would include in the organization’s operating system security hardening procedures.
You are encouraged to provide resources and citations. Any references should be formatted according to current APA style and formatting.
Additional Requirements
Use the following template: Assessment 4 format.docx
Length: Minimum of 3 pages.
Written communication: Written communication is free of errors that detract from the overall message.
APA formatting: If you use sources, ensure that resources and citations are formatted according to current APA style and formatting.
Font and font size: Times New Roman, 12 point.
Grading
Ensure you are following the scoring guide; this is how I will grade your paper:
Describe threats and vulnerabilities associated with at least two operating systems.
Describe an anti-malware solution for the organization and indicate which operating systems it supports.
Select a suitable intrusion detection system (IDS) solution for the organization and include a rationale for the selection.
Describe at least two control strategies that you would consider implementing for securing the company’s Web-based infrastructure.
Describe at least two control strategies that you would consider implementing for securing the company’s database infrastructure.
Define two items that you would include in the organization’s operating system security hardening procedures.