Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Secure Operating System Selection and ImplementationWA

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

SECURE OPERATING SYSTEM SELECTION AND IMPLEMENTATION 1

Secure Operating System Selection and Implementation

Capella University

IAS5025 - Network and Operating System

Jan 23, 2019


SECURE OPERATING SYSTEM SELECTION AND IMPLEMENTATION 2

Abstract
F-Linux Operating system project which is initiated by Global, Inc for further security of

operating system project by guiding the implementation of new initiatives of providing

information security of the OS project development life cycle and how the best practices of OS

software development life cycle can be employed and deliverables that can achieved throughout

the process, as the project manager l have the best opportunity to help deliver a secured operating

system project in a more secured way through this proposal of the project.

This paper describes the “proposal for a much secure operating system project which best

fit within the international organization. this paper, we will discuss the appropriate team

members which best fit for the participation of the project within the organization. The paper will

look at the timelines for major milestones and delivery dates of the OS project and what are

characteristics for a successful operating system security project” (Capella, 2019 para 16).

Keywords: timelines, secured OS, milestones, characteristics, delivery dates.


SECURE OPERATING SYSTEM SELECTION AND IMPLEMENTATION 3

Table of Content

 Cover Page,

 Abstract.

 Table of Content.

 Introduction/ Body

 Conclusion

 References
SECURE OPERATING SYSTEM SELECTION AND IMPLEMENTATION 4

Introduction

The characteristics for a successful OS security project will depend on the effective

project design in this design we define the project goals by the organization mission

requirements that we should achieve by the OS project team and stakeholders since it is the

outcome of the OS project. We are able take into account the expectations and needs of the

stakeholders within international organization when we are defining the goals which include the

security elements needs which is the OS flaws and weakness we overcome from the risk, flaws,

threats and security exposure of the OS project in defining the goals with the countermeasure for

security controls and methodologies for the mitigation these security elements and having all the

support and approval from stakeholders of the organization. Since these define goals are

measured against the feasibility of the OS security project goals can be the project security

outline objectives and security of OS project management responsibilities, there are also the

security controls from the administrative, technical and physical controls, the strategy for

development of security policy, such as the top-down strategy which makes easy for the project

manager to lead the project to success. There is should be set-out outcomes and deliverables for

the OS security project development life cycle which contains outcomes and deliverables which

breaking into a smaller task which require to be completed by the selected members of the OS

project team. This OS project outcome is specific in nature for what resources and roles are

needed. Also, they are measurable and achievable for the deliverables and dates to achieve OS

security project and all outcomes and deliverables have its intended results with a provide

timeline for the dates and time to complete (Michelle Pruitt, 2013, p 2-4).

Identifying the risk assessment of the Operating System security project we get to see we

want to achieve byways of success for the operating system security project from the security
SECURE OPERATING SYSTEM SELECTION AND IMPLEMENTATION 5

risk assessment report which project team might face base on the challenges, risk factors,

resources, time and date limitation influencing the project team abilities to function. Preparing a

visual aid for the Operating System security project which as snapshots of the project goals,

outcome, deliverables and project team functionality. The OS security project budget for all

financial related, by the budget we understand of all financial costing which will help the

stakeholder’s determination of the project feasibility. Finally, all stakeholders of the OS security

project have a full understanding of the project needs and requirements we then list the criteria

for judging the project achievement and monitoring processes in order of the project plan. We

then document all the data in the project charter for all to have. Since the OS security project

design will contain software development of User interface, the inputs, functional requirements,

security controls configuration, database approach/storage, and milestones structure (Bourgeois,

T. Bourgeois, n.d., p 3-7).

In defining the secured OS project with implemented the Application Network Bridge

working secure OS with service functions of information security plan which can be

incorporated into the organization security policy, how they handle the change management of

the OS security procedures with better program improvement of security controls of the

organization network system security taken into recognition how the organization business

functions service with continue base on the business continuity and disaster recovery plan. Since

a secure Operating System is protected on the organization network system such its service

functions is secure in the network system inbound and outbound traffic and its protected either

parameter defense, application security of OS by anti-malware, anti-virus and intrusion

detection/prevention system (Michelle Pruitt, 2013, p 6-10).

The project goals will be beneficiary to the organization in the security of the Operating
SECURE OPERATING SYSTEM SELECTION AND IMPLEMENTATION 6

system on host devices have network system connection from ethernet cables, servers,

workstations with processing condition from the network system LAN to the application network

bridge device with a secure connection for inbound and outbound network traffic with network

security principles in full implementation. The application network bridge device should have

enough memory in the central processing unit and memory services function.

 There is a protected network bridge which supports the lower and higher

security configuration with host memory service for the CPU.

 There is a security configuration for the user interface, inputs, the function

needs and how the database is going to store. With further client security

configuration will outline the services function of the application network

bridge and client programming services.

 Looking at the project planning initial phase structure backbone plan and

expansion. With main organization domain from the built core services

function and servers for the corporate offices.

 The second phase we implement the running of the security operations at

organizations, run the pilot domains in the operation sites in organizations.

Where we are able to arrange the dependent sites with application network

bridges devices. Configure the user accounts, security control trusts zones and

domains for the Windows 10 for the operation sites in the organization.

 The third phase we transfer all the core services functions the alternative OS

to new OS servers such as Linux OS or Windows OS and it dependent service

functions for the OS Internet Name Service, DHCP, a Printing function and

the web server (Bisbey, Hollingworth, 1978, p 8-13).


SECURE OPERATING SYSTEM SELECTION AND IMPLEMENTATION 7

Identify the project team stakeholders which consist of the ordinal interest compare to the

influential interest team members which focus on the organization security office and workflow

OS project security, that the project teams will have organization security sign-off on the

operating system security project deliverables and security attitude, these project teams are from

the organization, not the only from the security office. What will be the project team budget with

anticipation whether security is adequate? For us to move a key member of the project team

member to the high-security interest scale making from top management members, technical

team members, and operations team members which be looking at supporting the OS security

project influence and interest for the legal, change management, end-users (Michelle Pruitt,

2013, p 15-18).

With the project plan team, there is a communication plan and channels which will obey

all organization information security policies such as the sharing of secure OS project documents

with all the needed encryption and security access control. There are communication channels of

teleconference calls with project team with password protected WebEX video meetings, instant

messaging through secure channels, after meeting minutes share in secure emails and finally

there is project team risk management with workflow breakdown structure (Bourgeois, T.

Bourgeois, n.d., p 11-14).

Secure Operating System Project Team members

Team members/Title Roles/Responsibilities

John Walker He is responsible for the secure OS project

The Deployment/Validation Manager application network bridge network

architecture design, build, configuration,


SECURE OPERATING SYSTEM SELECTION AND IMPLEMENTATION 8

testing of OS, required services delivery be it

automatic or manual.

Ashkah Mirnie The secure Operating System application

The OS Build Manager network bridge release and configuration of

an authentication system, administrative

console and dashboard.

Eddie Lawson The secure Operating System application

The OS Build Manager network bridge release and configuration of

an authentication system, administrative

console and dashboard.

Sanjah Becks Services Implementation

Deployment/validate roles various system, monitoring of all system

activities

Tamales Bails Services Implementation and supervisor of

Deployment/validate roles various system, monitoring of all system

activities

Marshawn Short The initial and full support User Interface

Primary Life Support acceptance of service operation functions of

the IT and business operations.

Edith Baker OS testing and validating of all relevant user

Testing and Validation roles are placed required environment. The test data

and applications version.

Paul Reynolds OS testing and validating of all relevant user


SECURE OPERATING SYSTEM SELECTION AND IMPLEMENTATION 9

Testing and Validation roles are placed required environment. The test data

and applications version

Milestones, timelines and expected dates of the secure OS project plan.

Date Events

02/01/2019 Work completing the OS project propose

servers in the organization locations.

02/15/2019 Run the initial test of the application network

bridge and the domain done from the root

domain name, structuring the OS server to the

organization IT OS installation/ DNS

structure.

03/01/2019 Generating the report after run test of OS and

reconfiguring of the OS network system

protocol services and organization locations

DNS servers/domain.

03/08/2019 Running the test for OS project from client to

server with application network bridge for

network traffic handling.

03/22/2019 Prepare a report after round OS project

implementation, patch management and

change control for updates to network system


SECURE OPERATING SYSTEM SELECTION AND IMPLEMENTATION 10

devices such as the core servers with new

domain data.

04/05/2019 Presenting the report to the board of directors

and management,

04/19/2019 The final round of testing and validating the

record run / trust zone change control the OS

security project run on all organization

locations on servers and application network

bridge on the main Operating hub. Start the

Host run at the headquarter on this date.

After said and done the final report and monitoring of secure OS project for progress and

user administration and manual. We present to the management and board of directors the

project outcomes and result after the implementation.


SECURE OPERATING SYSTEM SELECTION AND IMPLEMENTATION 11

References

Santana, M. (2009). Chapter 6, Eliminating the Security weakness of Linux and Unix Operating

Systems. In Vacca, J. R. (Ed.), Computer and information security handbook Boston,

MA: Morgan Kaufmann Publishers.

Capella University, 2019, Courseroom, unit 4, Secure Operating System Selection and

Implementation, Date retrieved 01/30/2019,

https://courserooma.capella.edu/webapps/blackboard/content/listContent.jsp?course_id=_

162482_1&content_id=_7268977_1&mode=reset

Microsoft. (2018). Deployment Teams. Date retrieved 01/30/2019,

https://technet.microsoft.com/en-us/library/cc960311.aspx

Michelle Pruitt, 2013, SANS, Security Best Practices for IT Project Managers, Date retrieved

01/30/2019, https://www.sans.org/reading-room/whitepapers/bestprac/security-practices-

project-managers-34257

Dave Bourgeois, David T. Bourgeois, n.d., Pressbook, chapter 9: The People in Information

Systems, Date retrieved 01/30/2019, https://bus206.pressbooks.com/chapter/chapter-

people/

Richard Bisbey, Dennis Hollingworth, (1978), PROTECTION ANALYSIS, Date retrieved

01/30/2019, https://csrc.nist.gov/csrc/media/publications/conference-

paper/1998/10/08/proceedings-of-the-21st-nissc-1998/documents/early-cs-

papers/bisb78.pdf
SECURE OPERATING SYSTEM SELECTION AND IMPLEMENTATION 12

You might also like