Analyze proper reasoning for each step in securing


Discussions

1. Review the critical considerations and research the Internet.

• Explain a secure connection and its establishment requirements.
• Provide a proper rationale while giving the sequence of steps that will verify whether the controls are working to require secure connections.
• Submit the procedure guide to this discussion forum.

2. Research the Internet on the various aspects of a malware-free security policy.

• Review the critical considerations to prepare the procedure guide.
• Organize all steps necessary for a malware-free environment.
• Provide proper justification for each step mentioned in the procedure guide.
• Submit the procedure guide document to your instructor.

3. Research the Internet to obtain information on Windows Group Policies and the Group Policy Editor.

• Review the critical considerations to prepare a procedure guide.
• Organize all the steps necessary for implementing Group Policies.
• Provide a proper justification for each step mentioned in the procedure guide.
• Submit the procedure guide to this forum.

4. Research the Internet to obtain information on MBSA and security audits.

• Review the critical considerations to prepare the procedure guide.
• Organize all the steps necessary for security audits.
• Provide a proper justification for each step mentioned in the procedure guide.
• Submit the procedure guide to this forum.

5. Search the Internet for data backup techniques.

• Review the critical considerations to prepare the procedure guide.
• Provide a proper justification for each step mentioned in the procedure guide.

6. Research the Internet to obtain information on Windows network security.

• Review the critical considerations to prepare a procedure guide.
• Organize all the steps necessary for implementing security on both a wired and wireless network.
• Provide a proper justification for each step mentioned in the procedure guide.

7. Identify the proper phase in the PDCA cycle for each security administration task discussed in the lab.

• Explain with proper reasoning how a specific administrative task helped in securing the environment.

8. Search the Internet for information on software development management policies.

• Provide requirements for securing each step of the software development process.
• Explain and give proper reasoning for each step in securing application software.

Teacher comments

You were asked to provide requirements for securing each step of the software development process.

As well as explain and give proper reasoning for each step in securing application software.

9. Search the Internet for information on securing Web servers and Web browsers.

• Provide all requirements necessary for securing the application software.
• Explain and give proper reasoning for each step to secure the application software.
• Submit your response to this forum.

10. Search the Internet for information on Windows incident-handling tools.

• Identify the correct function to secure incidents of Ken 7.
• Explain with proper reasoning your choice of the software tools to be used for Ken 7.
• Submit your response to this forum.

11. Research the Internet to obtain information on one of the following: SDLC, SCM, or Agile software development.

• Review the critical considerations to prepare a procedure guide.
• Organize all the steps necessary for implementing the method you chose.
• Provide a proper justification for each step mentioned in the procedure guide.

Teacher comments

Organize all the steps necessary for implementing the method you chose.Provide a proper justification for each step mentioned in the procedure guide.

Solution Preview :

Prepared by a verified Expert
Software Engineering: Analyze proper reasoning for each step in securing
Reference No:- TGS02560739

Now Priced at $45 (50% Discount)

Recommended (97%)

Rated (4.9/5)