Limited time offer

Get 25% off your order

Use the code below at checkout — offer expires soon.

Your promo codeNURSE24
25%
Expires in: 10:00
Claim my 25% discount
LIMITED OFFER Get 25% off — use code BESTW25 | No AI No Plagiarism On-Time Delivery Free Revisions Claim Now

EssayQuest – 24/7 Homework & Research Assistance

Fast, Reliable, and Plagiarism-Free Help for Students in the USA, UK & Australia

EssayQuest – 24/7 Homework & Research Assistance

Fast, Reliable, and Plagiarism-Free Help for Students in the USA, UK & Australia

Research security-related issues for implementing your chosen software including policies regarding implementation and management as well as integration with an existing system.

Overview

In the Week 3 Assignment, you assessed the security vulnerabilities of a business application and how to address them. In last week’s lab, you determined and configured the roles that are needed for application development and deployment. In this assignment, you apply what you have learned by assessing security aspects related to the implementation of your chosen application.

Preparation

Research security-related issues for implementing your chosen software including policies regarding implementation and management as well as integration with an existing system.

Instructions

Do the following:

  • Describe the human resources (roles and skills) required to both implement and manage your chosen software effectively. Include the permissions/access configurations for which each role should be provisioned.
  • Explain the importance of 3 security policy considerations for integrating the app with existing internal systems.
  • Assess how well the application addresses the following areas. Provide specific examples for support.
    • Access Control
    • Data & personnel isolation
    • Zero trust

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.

The specific course learning outcomes associated with this assignment are:

  • Evaluate application technologies and the security issues associated with them.
  • Define processes for ensuring web application security.
Research security-related issues for implementing your chosen software including policies regarding implementation and management as well as integration with an existing system.
Scroll to top