Information Systems homework help

Part 1
Microsoft adheres to a defense-in-depth principle to ensure protection of its cloud services, such as Microsoft Office 365. Built-in security features include threat protection to reduce malware infections, phishing attacks, distributed denial of service (DDoS) attacks, and other types of security threats.
Answer the following question(s):
Would an organization need to apply security controls to allow safe use of those applications? Why or why not?
Fully address the question(s) in this discussion; provide valid rationale for your choices, where applicable; and respond to at least two other students’ views.
 
To complete this assignment, you must do the following

  1. A) Create a new thread.

 

  1. B) Select AT LEAST 3 other students’ threads and post substantive comments on those threads, evaluating the pros and cons of that student’s recommendations.

Your comments should extend the conversation started with the thread.
ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)
 
NOTE: These discussions should be informal discussions, NOT research papers. If you MUST directly quote a resource, then cite it properly. However,
I would much rather simply read your words.
 
Part 2
Submission Requirements
? Format: Microsoft Word (or compatible)
? Font: Arial, size 12, double-space
? Citation Style: APA
? Length: 2 page
? APA Format
? No resources before 2015
? Must complete all parts to answer the questions
? Don’t Write questions in the paper
? Write proper heading to paragraphs in APA format
 
Scenario
One of the security improvements for the “Your Company” environment is to ensure all workstations and servers run secure applications. The company needs policies that set security requirements for the software. These policies will guide administrators in developing procedures to ensure all client and server software is as secure as possible.
Specifically, you will write two policies to ensure web server software and web browsers are secure. Your policy statements will describe the goals that define a secure application.  For this project – you will write the web server software policy!!
Consider the following questions for web server software and web browsers:

  1. What functions should this software application provide?
  2. What functions should this software application prohibit?
  3. What controls are necessary to ensure this applications software operates as intended?
  4. What steps are necessary to validate that the software operates as intended?TasksCreate two policies — one for web server software and one for web browser clients. Remember, you are writing policies, not procedures. Focus on the high-level tasks, not the individual steps.

Use the following as a guide for both policies:
▪ Type of application software
▪ Description of functions this software should allow
▪ Description of functions this software should prohibit
▪ Known vulnerabilities associated with software
▪ Controls necessary to ensure compliance with desired functionality
▪ Method to assess security control effectiveness
 
Part 3
Submission Requirements
? Font: Arial, size 12, double-space
? Citation Style: APA
? Length: 2 page
? APA Format
? No resources before 2015
? Must complete all parts to answer the questions
? Don’t Write questions in the paper
? Write proper heading to paragraphs in APA format
 
Scenario
One of the security improvements for the “Your Company” environment is to ensure all workstations and servers run secure applications. The company needs policies that set security requirements for the software. These policies will guide administrators in developing procedures to ensure all client and server software is as secure as possible.
Specifically, you will write two policies to ensure web server software and web browsers are secure. Your policy statements will describe the goals that define a secure application.  For this project – you will write the web browser policy!!
Consider the following questions for web server software and web browsers:

  1. What functions should this software application provide?
  2. What functions should this software application prohibit?
  3. What controls are necessary to ensure this applications software operates as intended?
  4. What steps are necessary to validate that the software operates as intended?TasksCreate two policies — one for web server software and one for web browser clients. Remember, you are writing policies, not procedures. Focus on the high-level tasks, not the individual steps.

Use the following as a guide for both policies:
▪ Type of application software
▪ Description of functions this software should allow
▪ Description of functions this software should prohibit
▪ Known vulnerabilities associated with software
▪ Controls necessary to ensure compliance with desired functionality
▪ Method to assess security control effectiveness