Get answer

Assessment Description It is necessary to understand that there is more than just file vulnerabilities in order to recognize the brevity of a situation involving an operating system attack that can re

Assessment Description

It is necessary to understand that there is more than just file vulnerabilities in order to recognize the brevity of a situation involving an operating system attack that can render an entire system compromised.

Using the GCU library, research the security differences between the Windows and the Linux operation system. In 500-750 words, address the following:

  1. Proactive and reactive defensive tools provided by the operating system vendors themselves
  2. Third-party tools that further assist in mitigating cybersecurity threats
  3. Different methodologies used by hackers who have found a way to penetrate both operating systems
  4. At least one chart detailing the severity of at least five vulnerabilities found throughout your research, including descriptions of the potential side effects of the vulnerability becoming active
  5. At least one table outlining differing types of vulnerabilities for each operating system; within the table, including solutions to these vulnerabilities in the form of tools provided by the operating system vendor or third party vendors who provide mitigation tools for the vulnerability you list
  6. Evidence that exposes any trends found regarding each operating systems security efforts

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance.

This benchmark assignment assesses the following programmatic competencies:

MS Cybersecurity

1.2: Apply appropriate qualitative and quantitative analytic methodologies to predict trends and communicate security strategies to meet business objectives.