Security improvements for Always Fresh IT environment

Assignment Help Basic Computer Science
Reference no: EM132548949

Scenario

One of the security improvements for the Always Fresh IT environment is to ensure all workstations and servers run secure applications. The company needs policies that set security requirements for the software. These policies will guide administrators in developing procedures to ensure all client and server software is as secure as possible.

Specifically, you will write two policies to ensure web server software and web browsers are secure. Your policy statements will describe the goals that define a secure application.

Consider the following questions for web server software and web browsers:

1. What functions should this software application provide?

2. What functions should this software application prohibit?

3. What controls are necessary to ensure this applications software operates as intended?

4. What steps are necessary to validate that the software operates as intended?

Tasks

Create two policies-one for web server software and one for web browser clients. Remember, you are writing policies, not procedures. Focus on the high-level tasks, not the individual steps.

Use the following as a guide for both policies:

1. Type of application software

2. Description of functions this software should allow

3. Description of functions this software should prohibit

4. Known vulnerabilities associated with software

5. Controls necessary to ensure compliance with desired functionality

6. Method to assess security control effectiveness.

Reference no: EM132548949

Questions Cloud

Develop product service idea : Describe the product/service including the benefits of using the product/service. Discuss the potential customers for this product/service.
Discuss the potential customers for product-service : Develop a product service idea. Discuss the potential customers for this product/service.
Effect of culture on teams : Review one academically reviewed articles on how cultures affect team management. Develop power presentation based on the article.
Organization invests in data systems : Why do vendors have such an arrogant position about their technology once an organization invests in a data systems.
Security improvements for Always Fresh IT environment : One of the security improvements for the Always Fresh IT environment is to ensure all workstations and servers run secure applications.
Evidence collection policy : What are the main concerns when collecting evidence? What precautions are necessary to preserve evidence state?
Configuring desktop and system security : Essentially, it is a document that serves as a guide to configuring a desktop / system security.
Business intelligence-what is deep learning : What is deep learning? What can deep learning do that traditional machine-learning methods cannot?
Leveraging erm to practice strategic risk management : Do believe that risk is a two-sided coin with both upside gains and downside losses? Do you believe that ERM will continue to evolve, and if so, how?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create one z-specification for system

Create one (1) short Z-specification for this system using Visio or an equivalent such as Dia. Note: The graphically depicted solution is not included in the required page length.

  Digikey or newark distributor sites

Go on the internet, eg. the Amazon site, or the Digikey or Newark distributor sites, and read up on three types of Arduino shields used with the Arduino Uno. Explain what type of projects each shield is used with.

  What is a process model

1. What is a process model? What is a data flow diagram (DFD)? Are the two related? If so, how? 2. Distinguish between logical process models and physical process models.

  Considered in determining global expansion

What are the key issues that need to be considered in determining global expansion?

  End-point device security

Assume you are an IT Manager in charge of developing policies for your organization's upcoming BYOD usage announcement. Policies could include categories such as devices supported, passwords, employee use, applications, expense reimbursement, etc..

  Program that adds the elements in the odd indices

Write an assembly program that adds the elements in the odd indices of the following array. Use LOOP. What is the final value in the register? array1 DWORD 10, 20, 30, 40, 50, 60, 70, 80, 90, 100

  Promote a sound-stable banking system

What institutional arrangements are necessary to promote a sound, stable banking system?

  What is an information security threat

a) Explain three(3) database security issues b) What is an information security threat?

  Write a windows application to test your implementation

Write a program that stores names and phone numbers from a text file in a dictionary, with the name being the key. Write a method that does a reverse lookup, that is, finds a name given a phone number. Write a Windows application to test your impl..

  Algorithm to decide if an input edge

You are given a weighted graph G = (V,E) with positive weights, c(i) for all i in E. Give a linear time (O(|E| + |V|)) algorithm to decide if an input

  Determine the length of array

Demonstrate how you would determine the length of your array. Show this through a code example you create where you use the length member.

  Find particular use of excel interesting

Why did you find this particular use of Excel interesting? Would you consider this use of Excel to be for good or could it be leading to the improper use of computer technology?  Explain your answer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd