Unit 10 Assignment: Analyzing Vulnerabilities

Outcomes addressed in this activity:

Unit Outcomes:

  • Set up host security.
  • Secure data with encryption.

Course Outcome:

IT275-5: Configure security within the Linux operating system.

GEL-7.04: Evaluate the reasoning of opposing perspectives on ethical issues.

Purpose

The purpose of this assignment is to do statistical analysis to see which operating system is considered the most secure based on vulnerability scores. Your analysis will consider a website provided, as well as other original resources you find. The outcome is to have a better understanding of operating systems and the existing vulnerabilities and what must be done to secure our environment.

Assignment Instructions

To start, use the website https://www.cvedetails.com/top-50-vendor-cvssscore-distribution.php

This website provides a CVSS Score Distribution for the Top 50 Vendors by Total Number of “Distinct” Vulnerabilities. You are to use this website to compare the vulnerabilities of Microsoft, Apple, and Linux. Note that Linux will have a couple distributions. Pick a Linux distribution you would utilize in your company.

Compare the statistics of the various operating systems and their respective vulnerabilities. Compare the number of total vulnerabilities and their risk rankings. Which operating system would you use and why? Some things to consider:

  • Employee knowledge of the system
  • Total cost of the system
  • Total cost to secure the system
  • Are there any ethical issues by using one vendor?
    • For instance, has any vendor been accused of utilizing customer data in a way it was not intended?

Assignment Requirements

The assignment must be submitted in Word format. The assignment should be 1-2 pages in length. The assignment should have a title page and a reference page. These pages are not included in the total page length. You must include at least two original sources in your paper.

Also review the university policy on plagiarism. If you have any questions, please contact your professor.

Be sure to include both in-text citations and references for all sources. For more information on APA style formatting, go to the resources under the Academic Tools area of this course.

Plagiarism

Plagiarism is an act of academic dishonesty. It violates the University Honor Code, and the offense is subject to disciplinary action. You are expected to be the sole author of your work. Use of another person’s work or ideas must be accompanied by specific citations and references. Whether the action is intentional or not, it still constitutes plagiarism.

For more information on University’s Plagiarism policy, refer to the current University Catalog.

Directions for Submitting Your Assignment

Compose your Assignment in a Word document, including screen shots as appropriate and save it as IT275_YourName_Unit_10, and submit it to the Dropbox for Unit 10.

Review the Unit 10 Assignment Rubric before beginning this activity.

Do you need urgent help with this or a similar assignment? Say no more, we have just the experts you need to help you. Place your order.

Scroll to Top