Project Power Point NO PLAGIARISM

Prepare an 10-12 slide Microsoft PowerPoint highlighting the content from the paper. Attached is the outline of the paper.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

· You may use resources from any library, government library, or any peer-reviewed reference (Wikipedia and any other publicly-reviewed source is not accepted).

· The PowerPoint of 10-12 slides is a summary of this paper. No new topics, ideas or concepts are introduced in the PowerPoint that is not included in the paper. A minimum of 10 references are needed.

· The PowerPoint is a highlight of the paper. It is not a narrative.

Some notes about the paper outline that needs to be defined in the PowerPoint are:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

– Provide additional sub-sections with more detail not narrative like the paper outline.

– Given the subject, the following needs to be included: Who remediates the vulnerabilities.? How are you vetting the vulnerabilities? How do you eliminate false positives? How are the vulnerabilities trends communicated to security committees or board of directors?  

Operating SystemIT Security

Running head: WINDOWS OS VULNERABILITIES 1

WINDOWS OS VULNERABILITIES 4

Windows Operating System Vulnerabilities

Introduction

All software’s have a degree of vulnerability and quality gaps that result in adverse negative effects if they are not adequately addressed. This is because many malicious on the network always exist and they enjoy causing the negative effects for fun or financial gains or any other reasons known to them. Microsoft Window Operation System (OS) is not an exception when it comes to critical vulnerabilities as many flaws in the system has unearthed by malicious persons always targeting such vulnerabilities for their personally-known reasons. The effects of security breaches brought about by the vulnerabilities are adverse and that is why the Operating System developers strive to make them as secure as possible to cushion the users against such effects.

What are system vulnerabilities?

A working definition of system vulnerabilities and the examples of such vulnerabilities. Again, the examples of such vulnerabilities will be outlined.

Recent Microsoft’s Communication of the Windows OS Vulnerability

Detailed explanation of the Microsoft’s January report on the state of its operating system’s vulnerabilities.

Effects of such vulnerabilities

A succinct explanation of the effects brought by operating system vulnerabilities on two levels; effects on the software as well as effects on the individuals using the affected computers.

Effects on the software

The security vulnerabilities target the essential components of the software that may compromise its entire usability rendering it useless. For example, when attacked by virus that may be hard or completely impossible to get rid of which renders the computer completely unusable.

Effects on people

Elevation privilege – the attacker takes greater privileges on the system that has been compromised and this allows them to control the computer system or destroy data for their malicious gains.

Information Disclosure – gaining access to confidential information for malicious intent.

Denial of Service Attacks – this attacker denies the authorized persons from accessing their computing assets because of interference on the working of the system.

How Microsoft Addresses the Vulnerabilities

Monthly Microsoft’s security patches on their systems and reporting to the system users grading the security measures they should be taking.

Conclusion

In conclusion, system vulnerabilities are a common part of all software produced. Operating System is one of such software and hence it is not an exception when it comes to the effects of critical vulnerabilities. Microsoft’s Windows operating system has been reported to be affected by many security breaches that have been nuisance to the users of the operating system.

References

Anand, A., Das, S., Aggrawal, D., & Klochkov, Y. (2017). Vulnerability discovery modelling for software with multi-versions. In Advances in reliability and system engineering (pp. 255-265). Springer, Cham.

Elder, M. C., Kienzle, D. M., Manadhata, P. K., & Persaud, R. K. (2016). U.S. Patent No. 9,317,692. Washington, DC: U.S. Patent and Trademark Office.

Seo, D., & Lee, K. (2017). Comparing security vulnerability by operating system environment. International Journal of Services Technology and Management, 23(1-2), 154-164.

Cyber security & Infrastructure Security Agency (2020). Critical Vulnerabilities in Microsooft Windows Operating System. Retrieved from

https://us-cert.cisa.gov/ncas/alerts/aa20-014a

Hugard IV, J. M., Leroux, A. L., Mallabarapu, C., Muniz, J. A., Russell, B. C., & Wu, Z. (2016). U.S. Patent No. 9,251,351. Washington, DC: U.S. Patent and Trademark Office.

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP