SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 313 Weeks Ago, 5 Days Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 08 Jan 2018 My Price 7.00

employee has worked at the same job for 6 years


Designing Secure Software

Part 1

as a class discuss zero-day affects and other aspects of security that help to enhance and maintain the new software system put into place. Please respond to all of the following prompts:

As a part of zero-day affects, how does the NIST become so relevant?

Why?

What is an insider threat, and how can this plague system security?

An employee has worked at the same job for 6 years, comes to work every day – never sick, and never takes a vacation.

How is this viewed from a security standpoint?

Why?

Part 2

Web applications make remote access to system resources and data possible via the Internet. However, there are considerations that must be addressed when enabling this, including the appropriateness of making data available via the Internet and access controls to the data and the web application. Additionally, we must consider methods of securely granting access to the appropriate users while protecting the confidentiality and integrity of customer and company information.

Please respond to all of the following prompts:

Identify the advantages and disadvantages of using a web application to access your company’s data.

Identify the advantages and disadvantages of using a Virtual Private Network (VPN) and other proprietary access methods.

Share at least three best practices used in securing a web application.

Answers

(5)
Status NEW Posted 08 Jan 2018 01:01 PM My Price 7.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)