please do the following:
#1: Compare the advantages and disadvantages of a process-based DO/S.
#2 : Investigate the names and trigger events for 20 viruses discovered in the past 12 months. Research TWO in detail, describing which files they infect, how they spread, and their intended effects.
#3: Using information from the CERT Coordination Center identify the latest vulnerability for an operating system of your choice. List the threat, the criticality of the threat, the potential impact, the suggested solution, the systems that are affected, and the actions you would take as a system administrator.
””’About 20% of your answer can be copied from resources (books, web site, etc.). If so, please be sure to put that into quotation form, also indicate foot notes and provide the resource(s) for anything you copy.”””
EXPERT SOLUTION ANSWER