• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Syllabus
  • Schedule
    • Section 1
      • Week 1: Course Introduction
      • Week 2: Access Controls
      • Week 3: Systems Software Security
      • Week 4: Applications Software Security
      • Week 5: Cryptography Protocols
      • Week 6: Practical Cryptography
      • Week 7: Midterm Exam
    • Section 2
      • Week 8: Business Continuity & Disaster Recovery
      • Week 9: Security Operations
      • Week 10: Physical & Environmental Security
      • Week 11: Security Architecture & Design
      • Week 12: – Network Protocols
      • Week 13: Telecommunications and Network Security
      • Week 14: Risk Management and Compliance
      • Week 15: Final Exam
  • Course Material
    • Case Studies
      • C2.1 (9/12)
      • C4.1 (9/26)
      • C6.1 (10/10)
      • C8.1 (10/24)
      • C9.1 (10/31)
      • C10.1 (11/7)
      • C11.1 (11/14)
    • Practical Assignments
      • PA1.1 (Due 9/12)
      • PA2.1 (Due 9/26)
      • PA4.1 (Due 10/3)
      • PA5 (Due 10/17)
        • PA5.1
        • PA5.2
        • PA5.3
      • PA8.1 (Due 10/31)
      • PA9.1 (Due 11/7)
      • PA10.1 (Due 11/7)
      • PA11.1 ( Due 11/24)
      • PA12.1 (Due 11/28)
      • PA13 (Due 12/5)
        • PA13.1
        • PA13.2
        • PA13.3
    • Written Assignments
      • WA2.1 (Due 9/19)
      • WA3.1 (Due 9/26)
      • WA4.1 (Due 10/3)
      • WA6.1 (Due 10/17)
      • WA8.1 (Due 10/31)
      • WA9.1 (Due 11/7)
      • WA10.1 (Due 11/14)
      • WA12.1 (Due 11/28)
      • WA13.1 (Due 12/5)
  • Webex
  • Gradebook

ITACS 5209

Temple University

Week 3 Written Assignment

Research the concept of a “trusted operating system”, or TOS.  There are versions of both Windows Server and Linux that can meet the standards required for TOS.  What exactly makes an operating system “trusted” by these standards?  Although TOS standards were developed for the US Government, anyone can use an OS that meets these standards.  Would you recommend any organization use a trusted OS?  How could they benefit from this, and what issues might they have making this a requirement in their infrastructure?

Primary Sidebar

Weekly Discussions

  • Uncategorized (12)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in