Ans 1:
For a system that monitors suspicious behavior, analyzes traffic for threats and provides visibility
into security we can use a Network-Based Intrusion Detection System (NIDS). It is like having
smart security cameras for our grocery store. It watches for any unusual activity like someone
trying to break in and alerts us in real time. Also it keeps track of everything happening inside
our store which gives us a warning of potential threats.
In simple terms, a NIDS acts as a security guard for our digital network, finding and alerting us
from any suspicious activity both inside and outside our store keeping our business safe from
cyber threats (Stallings, 2013).
Ans 2:
To protect attack against operating system we can use:
Before turning code into a program, we should analyze it carefully to find and fix any security
issues.
While making our program we should use tools that can find problems in the code and help us
fix them.
When writing code we must follow good practices like checking if the information is managing
computer memory well or not and handling files carefully to prevent hackers (Vyas, 2020).
Ans 3:
The basic steps to secure an operating system are as below:
a. By updating OS regularly. [3]
b. By enabling firewall and network security. [3]
c. By installing and updating antivirus software. [3]
d. By using strong passwords and encryption. [3]
e. By reviewing the permissions and privacy settings [3]
Ans 4:
For Case 1, I will use the Sensitivity Based Access Control model. It let us see documents only if
we have the right clearance level. For example, someone with a secret clearance can not see a top
secret document.