Problem
You will consider yourself member of an organisation that has been tasked to conduct security hardening process to secure an operating system.
You are required to;
a) Choose one attacks that could be mounted against either Windows or Linux operating systems.
b) Describe the attack mechanisms.
c) Explain the security controls you could apply to prevent or mitigate these attacks .
d) Explain why these controls would work.