Question

Now to the second major bullet on the same slide: For Question 6 thru 10, you...

Now to the second major bullet on the same slide:

For Question 6 thru 10, you are to research any one operating system of your choice – desktop, server, or smart device and investigate how the following access and account management controls are implemented and used:

6. 7. 8. 9. 10.

Access Control Updates and patches

Event Logging
Backup and Restoring Data Two factor authentication

Here’s an example:

Answer 10. For two factor authentication (2FA), which relates to having at least two verifiable independent secrets for access, the Android OS set up allows you to add a phone number to receive and confirm a 6-digit code under “two-step verification”.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

ANSWER:-

6. Access Control:-

  • Here, Access control refers to security features that control who can access assets in the operating system.
  • Example :-After a user is authenticated, the operating system uses to built in approval and access control technology to implement the second phase of protecting assets influential if an genuine user has the correct permissions to access a resource.

7. Updates and patches:-

  • Update and patch is part of software designed to update a computer program to fix or improve it.
  • This includes fixing safety vulnerabilities, other bugs and improving the usability.
  • It means to fix problems; poorly designed patches can sometimes bring in new problems.
  • Example: - System update its service for the Windows Network family of operating system, which automatic downloading and install software updates over the Internet.

8. Event Logging:-

  • Event logging, it stores information about all events that occur in the system is useful. It is useful to view logged information if unnecessary behavior occurs in the system and you want to find out where the problem originate or get further details.
  • Example: - The Windows 8 Event log provides a marvelous interface to inspect critical and error messages in the logs.
  • It can examine not only the System and also its Application logs, but also Hardware Events and reports of activity from IE and other program.

9. Backup and Restoring Data:-

  • Backup and recovery procedures protect the database against data loss and restructure the data, should loss take place.
  • The reconstructing of data achieve through media recovery, which refers to the various operations involved in restore, roiling forward, and rolling back a backup of database files.
  • Example:-Recovery Manager is an Oracle utility that can back up, restore and recover database files.
  • It is a feature in the Oracle database server and it does not require separate mechanism.

10. Two factor authentication:-

  • Two-step authentication helps to protect you by making it more difficult for someone else to sign into your Microsoft account.
  • It uses two special forms of identity: One is your password, and other one is a contact method for security info.
  • If someone else finds/know your password, they will stop if they don’t have access to your security info.
  • This is also why it’s important to use special passwords for all your accounts.
Add a comment
Know the answer?
Add Answer to:
Now to the second major bullet on the same slide: For Question 6 thru 10, you...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT