AC 554 Unit 5 Homework Assignment NEW - PowerPoint PPT Presentation

About This Presentation
Title:

AC 554 Unit 5 Homework Assignment NEW

Description:

AC 554 Unit 5 Homework Assignment NEW Exercise 2 Question: Many companies offer their employees the ability to connect to the network from home computers. Because companies don’t have control over the home user’s machine, they can be exposed to viruses from these machines. What steps—technical and procedural—do you think are necessary in protecting the company network from insecurities of home computers? Exercise 3 Question: To ensure security of a system and to apply patches as required, an inventory of the existing environment is required. After all, you can’t have total security when you do not know what to secure. Meet with your organization’s information technology staff to understand their process to inventory their environment. Do they have a process? Does it work? What enhancement would you recommend? – PowerPoint PPT presentation

Number of Views:49

less

Transcript and Presenter's Notes

Title: AC 554 Unit 5 Homework Assignment NEW


1
Kalpan University AC 554 Unit 5
Homework Assignment NEW Check this A tutorial
guideline at http//www.assignmentcloud.com/ac-554
-kaplan-un.iversitv /ac-554-unit-5-homework-assi
gn m ent-new For more classes visit
http//www.assignmentcloud.com. Exercise 2
Question Many companies offer their employees
the ability to connect to the network from home
computers. Because companies don't have control
over the home user's machine, they can be exposed
to viruses from these machines. What
stepstechnical and proceduraldo you think are
necessary in protecting the company network from
insecurities of home computers? Exercise 3
2
Question To ensure security of a system and to
apply patches as required, an inventory of the
existing environment is required. After all, you
can't have total security when you do not know
what to secure. Meet with your organization's
information technology staff to understand their
process to inventory their environment. Do they
have a process? Does it work? What enhancement
would you recommend? Exercise 3 Question Review
various applications that you use on your
computers and on the Internet. Classify them by
the ones that require authentication and the ones
that do not. For the ones that do, analyze their
method of authentication. For example, are they
using cookies, are they using pass-through
authentication, and if so, are they relying on
client operating system?
3
Exercise 4 Question Review the programming
practices adopted within your organization or an
organization of your choice. What security best
practices do they adopt in ensuring application
security? What controls do they implement to
protect against attacks like SQL injection
and buffer overflow?
Write a Comment
User Comments (0)
About PowerShow.com