Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

******** PLEASE HELP ME ANSWER QUESTION 6-10********* For Question 6 thru 10, wr

ID: 3907596 • Letter: #

Question

******** PLEASE HELP ME ANSWER QUESTION 6-10*********

For Question 6 thru 10, write two sentences and you are to research any one operating system of your choice – desktop, server, or smart device and investigate how the following access and account management controls are implemented and used:

6- Access Control

7- Updates and patches

8- Event Logging

9- Backup and Restoring Data

10- Two factor authentication

Here’s an example: (DO NOT USE)

Answer 10. For two factor authentication (2FA), which relates to having at least two verifiable independent secrets for access, the Android OS set up allows you to add a phone number to receive and confirm a 6-digit code under “two-step verification”.

Explanation / Answer

6- Access Control - Access control refers to security features that control who can access resources in the operating system. Eg:- After a user is authenticated, the Microsoft Windows operating system uses built-in authorization and access control technologies to implement the second phase of protecting resources: determining if an authenticated user has the correct permissions to access a resource.

7- Updates and patches - A patch/update is a piece of software designed to update a computer program or its supporting data, to fix or improve it. This includes fixing security vulnerabilities and other bugs, and improving the usability or performance. Though meant to fix problems, poorly designed patches can sometimes introduce new problems. Eg:- Windows Update is a Microsoft service for the Windows 9x and Windows NT families of operating system, which automates downloading and installing software updates over the Internet.

8- Event Logging - The event log stores information about all events that occur in the system. It is useful to view logged information if unwanted behavior occurs in the system and you want to find out where the problem originates or get additional details. Eg:- The Windows 8 Event Viewer provides a marvellous interface to investigate critical and error messages in the logs. You can examine not only the System and Application logs, but also Hardware Events and records of activity from IE and other programs.

9- Backup and Restoring Data - Backup and recovery procedures protect your database against data loss and reconstruct the data, should loss occur. The reconstructing of data is achieved through media recovery, which refers to the various operations involved in restoring, rolling forward, and rolling back a backup of database files. Eg:- Recovery Manager (RMAN) is an Oracle utility that can back up, restore, and recover database files. It is a feature of the Oracle database server and does not require separate installation.

10. Two factor authentication - Two-step verification helps protect you by making it more difficult for someone else to sign in to your Microsoft account. It uses two different forms of identity: your password, and a contact method (also known as security info). Even if someone else finds your password, they'll be stopped if they don't have access to your security info. This is also why it's important to use different passwords for all your accounts.

Please let me know in case of any clarifications required. Thanks!