HI THERE ARE THREE TO ANSWER HERE WHICH YOU CAN GIVE ONLY UP TO 83 WORDS AND IF YOU CAN ANSWER IT FROM YOUR POINT OF VIEW I APRECIATE IT THANKS A LOT
1)
Operating system (OS) vulnerabilities refer to the risk exposures that allow the OS to be attacked by malware, causing damage to the hardware running it (Zaid et al., 2022). The OS vulnerabilities insinuate a flaw in system security procedures, system weakness, poor internal controls, and design or malfunctioning in implementing system controls. For example, the OS might be attacked by the Denial of Service (DoS), in which the system is overloaded with fake repeat requests, clogging the system, and slowing it down. These attacks can occur due to human error, software complexity, increased connectivity to the system, and poor access controls. The OS that is vulnerable needs to be fixed. This includes implementing system security measures and associated patching to protect sensitive areas. This practice is what is referred to as system hardening. The OS hardening describes the steps, procedures, and practices that stabilize its functions, control access, and resist malware attacks. These measures include installing anti-virus software to the system and other end-point control measures and regularly updating OS patches, implementing Wi-Fi security features that secure the system from malware, and hiding the plan from foreign Wi-Fi networks. In addition, firewalls monitor network traffic and enforce user controls and most minor privilege system access functions. Windows OS is standard in the world. Hardening a system would involve appropriately configured network firewalls, access privileges, and network rules audit, disabling unnecessary network ports and protocols, encrypting network traffic, and implementing an IPS/IDS system (Choi et al., 2018).
Every OS is suitable for a specific function or organization. The choice of the OS is primarily based on personal preferences. However, windows might be preferred in many applications or organizations. Windows run simple and vast gaming functions. Its compatibility supports a large backlog of old and new games that are playable on modern hardware. Windows has diverse functionalities and aesthetics. It allows users to access the Registry Editor tool, which customizes Windows experiences. Windows has high-quality productivity and supports vast software and hardware like AutoCAD, exemplifying its productivity functions. The OS system utilities simplify operating and monitoring network usage, GPU, RAM, and CPU. The system unity is stable and easy to navigate through current systems like windows 10 from windows 7. No OS is better than the other. The choice is based on experience and personal preferences. However, organizations might choose one OS over the other depending on the versatility of use, users' knowledge, and the fundamental objective of the organization. A company with human resources with a vast understanding of OS would prefer a stable and secure system. Others will choose compatible and simple OS if the users are at a beginner's level or have an unknown knowledge base. System security is a choice; thus, all OS can attain advanced security levels cost-effectively without compromising functionality (Alahmad et al., 2022).
2)
According to Kaspersky the top three most frequently exploited programs are Adobe flash, Adobe reader, and Oracle Java(Vulnerabilities, n.d).
Vulnerabilities – within an operating system (OS) or an application – can result from Program errors
Whereby an error in the program code may allow a computer virus to access the device and take control
Intended features
Legitimate, documented ways in which applications are allowed to access the system
If vulnerabilities are known to exist in an operating system or an application – whether those vulnerabilities are intended or not – the software will be open to attack by malicious programs(Vulnerabilities, n.d).
Hardening practices are lowering the vulnerabilities of a server or computer system. Closing areas that are vulnerable to cyberattacks.
- How should one go about in hardening operating systems and applications, such as a Web Sever? (For hardening of operating systems, you should choose one operating system. For example, you could choose, Windows, UNIX, Mac, etc.).
Hardening a windows IIS
- Windows OS is updated.
- Any features that are not in use disable.
- Use your firewall.
- Control which IP addresses can access your web server.
- URL authorization the feature allows you to apply rules for specific requests such as dealing with particular URLs. URL authorization can be used to authorize different users. This means that the users must authenticate themselves and based on their identities, will be allowed to view the requested page, or denied based on access granted.
- Logging in to see who has been accessing the web server.
- Configure the error page to see what issues there are because of the error(Ouzan, 2022).
- Do you think one system is better than the others or, it is a personal preference? Explain your answer.
I am used to windows because that is what I use on my laptop. I like Microsoft word. I can use excel, PowerPoint and Visio. The iPhone and android, I like the iPhone because there are so many excellent features but for the android, I liked the quality of the pictures that it made. The Windows Operating System is one of the most well-known system software. Many laptops and desktops use Windows OS. Using the Windows OS, you can install various application software, like Microsoft Word, Google Chrome, Firefox, and many other applications(Levin, 2021).
- What are some reasons why an organization would choose one operating system over another? Explain in terms of systems security.
The company would choose one system over the other operating system because the system they choose would meet the company’s security requirements. For example, a company may need advanced encryption for their email. "Security and privacy depend on an operating system that guards your system and information against the moment it starts up, providing fundamental chip-to-cloud protection." (“Windows operating system security - Windows security | Microsoft Docs”) Windows 11 is the most secure Windows yet with extensive security measures designed to help keep you safe. These measures include built-in advanced encryption and data protection, robust network and system security, and intelligent safeguards against ever-evolving threats(security, 2022).
References
Levin, B. (2021, April 22).15 System Software & Application Software Examples 2022. Retrieved from Rigorous Themes: rigorousthemes.com
Ouzan, E. (2022, June 7).How To Harden a Windows IIS Web Server. Retrieved from Host Advice: hostadvice.com
security, W. o. (2022, June 2).Windows operating system security. Retrieved from Microsoft: docs.microsoft.com
Vulnerabilities, E. a. (n.d).Exploits and Vulnerabilities. Retrieved from Kaspesky: usa.kaspersky.com
3)
While preparing to address this topic, take the following into consideration and share your thoughts on it:Windows is truly a very popular operating system. On the other hand, regarding the question “Is windows the most vulnerable operating system?”, there are different schools of thought and it has been argued that “Most malware still targets Microsoft platform, but Mac OS X has some security deficiencies, according to one expert”.
http://www.networkworld.com/news/2011/060611-mac-os-security.html