Discussions
1. Review the critical considerations and research the Internet.
· Explain a secure connection and its establishment requirements.
· Provide a proper rationale while giving the sequence of steps that will verify whether the controls are working to require secure connections.
· Submit the procedure guide to this discussion forum.
2. Research the Internet on the various aspects of a malware-free security policy.
· Review the critical considerations to prepare the procedure guide.
· Organize all steps necessary for a malware-free environment.
· Provide proper justification for each step mentioned in the procedure guide.
· Submit the procedure guide document to your instructor.
3. Research the Internet to obtain information on Windows Group Policies and the Group Policy Editor.
· Review the critical considerations to prepare a procedure guide.
· Organize all the steps necessary for implementing Group Policies.
· Provide a proper justification for each step mentioned in the procedure guide.
· Submit the procedure guide to this forum.
4. Research the Internet to obtain information on MBSA and security audits.
· Review the critical considerations to prepare the procedure guide.
· Organize all the steps necessary for security audits.
· Provide a proper justification for each step mentioned in the procedure guide.
· Submit the procedure guide to this forum.
5. Search the Internet for data backup techniques.
· Review the critical considerations to prepare the procedure guide.
· Provide a proper justification for each step mentioned in the procedure guide.
· Submit the procedure guide to this forum.
6. Research the Internet to obtain information on Windows network security.
· Review the critical considerations to prepare a procedure guide.
· Organize all the steps necessary for implementing security on both a wired and wireless network.
· Provide a proper justification for each step mentioned in the procedure guide.
· Submit the procedure guide to this forum.
7. Identify the proper phase in the PDCA cycle for each security administration task discussed in the lab.
· Explain with proper reasoning how a specific administrative task helped in securing the environment.
· Submit to this discussion board.
8. Search the Internet for information on software development management policies.
· Provide requirements for securing each step of the software development process.
· Explain and give proper reasoning for each step in securing application software.
· Submit your response to this forum.
9. Search the Internet for information on securing Web servers and Web browsers.
· Provide all requirements necessary for securing the application software.
· Explain and give proper reasoning for each step to secure the application software.
· Submit your response to this forum.
10. Search the Internet for information on Windows incident-handling tools.
· Identify the correct function to secure incidents of Ken 7.
· Explain with proper reasoning your choice of the software tools to be used for Ken 7.
· Submit your response to this forum.
11. Research the Internet to obtain information on one of the following: SDLC, SCM, or Agile software development.
· Review the critical considerations to prepare a procedure guide.
· Organize all the steps necessary for implementing the method you chose.
· Provide a proper justification for each step mentioned in the procedure guide.
· Submit the procedure guide to this forum.