week 7

 

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

In the Week 3 Assignment, you assessed the security vulnerabilities of a business application and how to address them. In last week’s lab, you determined and configured the roles that are needed for application development and deployment. In this assignment, you apply what you have learned by assessing security aspects related to the implementation of your chosen application.

Preparation

Research security-related issues for implementing your chosen software including policies regarding implementation and management as well as integration with an existing system.

Instructions

Do the following:

  • Describe the human resources (roles and skills) required to both implement and manage your chosen software effectively. Include the permissions/access configurations for which each role should be provisioned.
  • Explain the importance of 3 security policy considerations for integrating the app with existing internal systems.
  • Assess how well the application addresses the following areas. Provide specific examples for support.

    Access Control
    Data & personnel isolation
    Zero trust

    Save Time On Research and Writing
    Hire a Pro to Write You a 100% Plagiarism-Free Paper.
    Get My Paper

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the

Library site

for all support. Check with your professor for any additional instructions.

The specific course learning outcomes associated with this assignment are:

  • Evaluate application technologies and the security issues associated with them.
  • Define processes for ensuring web application security.

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER