Discussion

Discussions

1. Review the critical considerations and research the Internet.

· Explain a secure connection and its establishment requirements.

· Provide a proper rationale while giving the sequence of steps that will verify whether the controls are working to require secure connections.

· Submit the procedure guide to this discussion forum.

2. Research the Internet on the various aspects of a malware-free security policy.

· Review the critical considerations to prepare the procedure guide.

· Organize all steps necessary for a malware-free environment.

· Provide proper justification for each step mentioned in the procedure guide.

· Submit the procedure guide document to your instructor.

3. Research the Internet to obtain information on Windows Group Policies and the Group Policy Editor.

· Review the critical considerations to prepare a procedure guide.

· Organize all the steps necessary for implementing Group Policies.

· Provide a proper justification for each step mentioned in the procedure guide.

· Submit the procedure guide to this forum.

4. Research the Internet to obtain information on MBSA and security audits.

· Review the critical considerations to prepare the procedure guide.

· Organize all the steps necessary for security audits.

· Provide a proper justification for each step mentioned in the procedure guide.

· Submit the procedure guide to this forum.

5. Search the Internet for data backup techniques.

· Review the critical considerations to prepare the procedure guide.

· Provide a proper justification for each step mentioned in the procedure guide.

· Submit the procedure guide to this forum.

6. Research the Internet to obtain information on Windows network security.

· Review the critical considerations to prepare a procedure guide.

· Organize all the steps necessary for implementing security on both a wired and wireless network.

· Provide a proper justification for each step mentioned in the procedure guide.

· Submit the procedure guide to this forum.

7. Identify the proper phase in the PDCA cycle for each security administration task discussed in the lab.

· Explain with proper reasoning how a specific administrative task helped in securing the environment.

· Submit to this discussion board.

8. Search the Internet for information on software development management policies.

· Provide requirements for securing each step of the software development process.

· Explain and give proper reasoning for each step in securing application software.

· Submit your response to this forum.

9. Search the Internet for information on securing Web servers and Web browsers.

· Provide all requirements necessary for securing the application software.

· Explain and give proper reasoning for each step to secure the application software.

· Submit your response to this forum.

10. Search the Internet for information on Windows incident-handling tools.

· Identify the correct function to secure incidents of Ken 7.

· Explain with proper reasoning your choice of the software tools to be used for Ken 7.

· Submit your response to this forum.

11. Research the Internet to obtain information on one of the following: SDLC, SCM, or Agile software development.

· Review the critical considerations to prepare a procedure guide.

· Organize all the steps necessary for implementing the method you chose.

· Provide a proper justification for each step mentioned in the procedure guide.

· Submit the procedure guide to this forum.

Please follow and like us: