Assignment #3 – Anti-Virus on every OS?Let’s revisit your role as Chief Information Security Officer (CISO) at a high profile technology
company! You’re tasked with identifying Anti-virus options for every operating system you have in
your company. Most of your computers run Windows 10/11, but you have a few MacOS computers in
network as well. And a number of servers that run Linux that every computer connects to for various
purposes.
Explore the built in options to each of the OS and describe how they work – Windows defender; Mac
has Xprotect, their notarizer, etc; And linux has the AppArmor kernel module. Are these sufficient for
most companies? Do they provide sufficient capabilities for a business? Are they heuristic in nature,
do they look for odd behaviors? Or are they simply looking at signatures of known Malware?
If you don’t think they are sufficient, what options do you have for each of the OSes to protect yourself
from Malware?
What will we do?
Write a document showing you have conducted research on the built-in anti-virus systems with some
explanation as to how they work. These include:
•
•
•
Windows Defender
MacOS XProtect and Notarizer (Be sure to look up MacOS XProtect as the name is used
elsewhere as well)
Linux AppArmor (Kernel Module)
Answer the questions outlined above and determine if those are sufficient for 1) your own computer or
2) a company. If they aren’t sufficient, what would you recommend?
Why are we doing this?
The role of a CISO is meant to protect the information systems and data within an organization.
Malware is a persistent and evolving issue that can provide Advanced Persistent Threat (APT) actors to
gain access to your systems for long periods of time. And provide access vectors for standard hackers
to gain access to sensitive data. Understanding some of the options that exist are important.
Learning Objectives
This assignment makes use of multiple course objectives
• Describe and explain information security threats, vulnerabilities, and attack types.
• Identify information security requirements for organizations and systems.
• Explain Integral parts of best practices in information security.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more