Assignment 2
Assignment 2
Assignment 2
Analysis and Strategy Formulation for Secure Operating Systems in
the Current Technological Landscape
Important notes: This assignment is designed to evaluate your proficiency in addressing complex
engineering problems and activities, specifically targeting PO2 (Problem Analysis) with a focus on WK4
(Engineering Specialist Knowledge). It encompasses various aspects such as WP1 (Depth of Knowledge
Required), WP2 (Range of Conflicting Requirements), WP4 (Familiarity with Issues), WP7 (Interdependence)
for complex engineering problems, and EA1 (Range of Resources) and EA5 (Familiarity) for complex
engineering activities.
In this assignment, you are required to delve into the following topics. Make sure to identify
and formulate key aspects, research relevant literature, and provide comprehensive
analysis:
1. Exploration of Operating Systems for Ethical Hacking and Security Audits:
• Identify and discuss contemporary operating systems specifically designed or well-
suited for ethical hacking and security audits.
• Evaluate their features, strengths, and limitations in the context of cybersecurity.
2. Analysis of Current Security Vulnerabilities in Windows Systems:
• Investigate and examine the top three security vulnerabilities in the latest versions
of Windows operating systems.
• Discuss their implications and potential impact on systems and networks.
3. Formulation of Strategies for Windows Security Audits:
• Develop comprehensive strategies for conducting effective security audits on
Windows systems.
• Include considerations for new tools, techniques, and methodologies that have
emerged in recent years.
4. Role of Rust Programming Language in Enhancing Security:
• Explain how the Rust programming language, known for its safety and
performance, could enhance the security of operating systems and applications.
• Provide examples or case studies where Rust has been effectively utilized for this
purpose.
5. Mitigation Strategies for End-of-Life Operating Systems:
1 of 2
• Propose and detail strategies to mitigate the risks associated with using operating
systems that have reached their end-of-life.
• Consider aspects like legacy systems, compatibility issues, and transition plans to
more secure platforms.
Submission Guidelines:
• Your analysis should be grounded in recent research and developments in the field
of cybersecurity and operating systems.
• Make sure to cite relevant literature, including recent journal articles, conference
papers, and authoritative online resources.
• The assignment should demonstrate a deep understanding of the topics and reflect
critical thinking and analytical skills.
Evaluation Criteria:
• Depth and relevance of research
• Clarity and logic in problem formulation and analysis
• Originality and practicality of proposed strategies
• Quality of writing and adherence to academic standards
Submit an electronic copy of your report, ensuring that it is clear, comprehensive, and
includes the following elements:
• Use the cover page provided in the italeemc (late submission will result in a deduction of
the mark -25% per day).
• A detailed discussion or comparative analysis that shows a clear understanding of the
assignment topics.
• Submit your report to the italeemc assignment dropbox. Name your files as OSA2-{Your
Matric Number}.docx. For instance, OSA2-1901234.docx.
Additional Notes:
• There isn't a single correct answer. Make sure to justify your choices and conclusions.
• Collaborative discussion is encouraged, but plagiarism is strictly prohibited. It may lead
to penalties, including reduced marks (the mark will be divided by the number of similar
copies found). All reports will be subjected to Turnitin, with a maximum allowable
similarity score of 30%. Note that Turnitin is now able to detect AI-generated content.
• Full marks will be allocated towards the content demonstrating the student's
innovativeness and initiative towards the report.
*****************************
2 of 2