Week 9 Assignment:

  • Describe the CIA security concepts as related to operating systems. (Confidentiality, Integrity, Authentication, Authorization, and Availability.)
  • From the list, describe three common methods used to exploit weaknesses in an operating systems, and describe ways to mitigate these risks. (Spoofing, deception, man in the middle, back door, Trojan Horse, rootkit, etc.)

Submit a two to three page paper in APA format.

Testimonials

OPERATING SYSTEM -9
We have updated our contact contact information. Text Us Or WhatsApp Us+1-(309) 295-6991