Securing Applications with VPN

profileccie2001

 

Assessment Instructions

For this assessment, you will explain how to secure your applications and operating systems using various security tools. Use the suggested resources, the Capella library, and the Internet to research the subject matter.

  • Describe threats and vulnerabilities associated with at least two operating systems.
  • Describe an anti-malware solution for the organization and indicate on which operating systems it supports.
  • Select a suitable intrusion detection system (IDS) solution for the organization and explain the reasons for your suggestion.
  • Describe at least two control strategies that you would consider implementing for securing the company's Web-based infrastructure.
  • Describe at least two control strategies that you would consider implementing for securing the company's database infrastructure.
  • Define two items that you would include in the organization's operating system security hardening procedures.
  • You are encouraged to provide resources and citations. Any references should be formatted according to current APA style and formatting.

Additional Requirements

  • Written communication: Written communication is free of errors that detract from the overall message.
  • APA formatting: If you use sources, ensure that resources and citations are formatted according to current APA style and formatting.
  • Font and font size: Times New Roman, 12 point.
    • 6 years ago
    • 20
    Answer(1)

    Purchase the answer to view it

    blurred-text
    NOT RATED
    • attachment
      SECURINGAPPLICATIONSWITHVPN.docx