Secure Operating System Selection and ImplementationWA
Secure Operating System Selection and ImplementationWA
Secure Operating System Selection and ImplementationWA
Capella University
Abstract
F-Linux Operating system project which is initiated by Global, Inc for further security of
information security of the OS project development life cycle and how the best practices of OS
software development life cycle can be employed and deliverables that can achieved throughout
the process, as the project manager l have the best opportunity to help deliver a secured operating
system project in a more secured way through this proposal of the project.
This paper describes the “proposal for a much secure operating system project which best
fit within the international organization. this paper, we will discuss the appropriate team
members which best fit for the participation of the project within the organization. The paper will
look at the timelines for major milestones and delivery dates of the OS project and what are
characteristics for a successful operating system security project” (Capella, 2019 para 16).
Table of Content
Cover Page,
Abstract.
Table of Content.
Introduction/ Body
Conclusion
References
SECURE OPERATING SYSTEM SELECTION AND IMPLEMENTATION 4
Introduction
The characteristics for a successful OS security project will depend on the effective
project design in this design we define the project goals by the organization mission
requirements that we should achieve by the OS project team and stakeholders since it is the
outcome of the OS project. We are able take into account the expectations and needs of the
stakeholders within international organization when we are defining the goals which include the
security elements needs which is the OS flaws and weakness we overcome from the risk, flaws,
threats and security exposure of the OS project in defining the goals with the countermeasure for
security controls and methodologies for the mitigation these security elements and having all the
support and approval from stakeholders of the organization. Since these define goals are
measured against the feasibility of the OS security project goals can be the project security
outline objectives and security of OS project management responsibilities, there are also the
security controls from the administrative, technical and physical controls, the strategy for
development of security policy, such as the top-down strategy which makes easy for the project
manager to lead the project to success. There is should be set-out outcomes and deliverables for
the OS security project development life cycle which contains outcomes and deliverables which
breaking into a smaller task which require to be completed by the selected members of the OS
project team. This OS project outcome is specific in nature for what resources and roles are
needed. Also, they are measurable and achievable for the deliverables and dates to achieve OS
security project and all outcomes and deliverables have its intended results with a provide
timeline for the dates and time to complete (Michelle Pruitt, 2013, p 2-4).
Identifying the risk assessment of the Operating System security project we get to see we
want to achieve byways of success for the operating system security project from the security
SECURE OPERATING SYSTEM SELECTION AND IMPLEMENTATION 5
risk assessment report which project team might face base on the challenges, risk factors,
resources, time and date limitation influencing the project team abilities to function. Preparing a
visual aid for the Operating System security project which as snapshots of the project goals,
outcome, deliverables and project team functionality. The OS security project budget for all
financial related, by the budget we understand of all financial costing which will help the
stakeholder’s determination of the project feasibility. Finally, all stakeholders of the OS security
project have a full understanding of the project needs and requirements we then list the criteria
for judging the project achievement and monitoring processes in order of the project plan. We
then document all the data in the project charter for all to have. Since the OS security project
design will contain software development of User interface, the inputs, functional requirements,
In defining the secured OS project with implemented the Application Network Bridge
working secure OS with service functions of information security plan which can be
incorporated into the organization security policy, how they handle the change management of
the OS security procedures with better program improvement of security controls of the
organization network system security taken into recognition how the organization business
functions service with continue base on the business continuity and disaster recovery plan. Since
a secure Operating System is protected on the organization network system such its service
functions is secure in the network system inbound and outbound traffic and its protected either
The project goals will be beneficiary to the organization in the security of the Operating
SECURE OPERATING SYSTEM SELECTION AND IMPLEMENTATION 6
system on host devices have network system connection from ethernet cables, servers,
workstations with processing condition from the network system LAN to the application network
bridge device with a secure connection for inbound and outbound network traffic with network
security principles in full implementation. The application network bridge device should have
enough memory in the central processing unit and memory services function.
There is a protected network bridge which supports the lower and higher
There is a security configuration for the user interface, inputs, the function
needs and how the database is going to store. With further client security
Looking at the project planning initial phase structure backbone plan and
expansion. With main organization domain from the built core services
Where we are able to arrange the dependent sites with application network
bridges devices. Configure the user accounts, security control trusts zones and
domains for the Windows 10 for the operation sites in the organization.
The third phase we transfer all the core services functions the alternative OS
functions for the OS Internet Name Service, DHCP, a Printing function and
Identify the project team stakeholders which consist of the ordinal interest compare to the
influential interest team members which focus on the organization security office and workflow
OS project security, that the project teams will have organization security sign-off on the
operating system security project deliverables and security attitude, these project teams are from
the organization, not the only from the security office. What will be the project team budget with
anticipation whether security is adequate? For us to move a key member of the project team
member to the high-security interest scale making from top management members, technical
team members, and operations team members which be looking at supporting the OS security
project influence and interest for the legal, change management, end-users (Michelle Pruitt,
2013, p 15-18).
With the project plan team, there is a communication plan and channels which will obey
all organization information security policies such as the sharing of secure OS project documents
with all the needed encryption and security access control. There are communication channels of
teleconference calls with project team with password protected WebEX video meetings, instant
messaging through secure channels, after meeting minutes share in secure emails and finally
there is project team risk management with workflow breakdown structure (Bourgeois, T.
automatic or manual.
activities
activities
Testing and Validation roles are placed required environment. The test data
Testing and Validation roles are placed required environment. The test data
Date Events
structure.
DNS servers/domain.
domain data.
and management,
After said and done the final report and monitoring of secure OS project for progress and
user administration and manual. We present to the management and board of directors the
References
Santana, M. (2009). Chapter 6, Eliminating the Security weakness of Linux and Unix Operating
Capella University, 2019, Courseroom, unit 4, Secure Operating System Selection and
https://courserooma.capella.edu/webapps/blackboard/content/listContent.jsp?course_id=_
162482_1&content_id=_7268977_1&mode=reset
https://technet.microsoft.com/en-us/library/cc960311.aspx
Michelle Pruitt, 2013, SANS, Security Best Practices for IT Project Managers, Date retrieved
01/30/2019, https://www.sans.org/reading-room/whitepapers/bestprac/security-practices-
project-managers-34257
Dave Bourgeois, David T. Bourgeois, n.d., Pressbook, chapter 9: The People in Information
people/
01/30/2019, https://csrc.nist.gov/csrc/media/publications/conference-
paper/1998/10/08/proceedings-of-the-21st-nissc-1998/documents/early-cs-
papers/bisb78.pdf
SECURE OPERATING SYSTEM SELECTION AND IMPLEMENTATION 12