Discussions
1. Review the critical considerations and research the Internet.
• Explain a secure connection and its establishment requirements.
• Provide a proper rationale while giving the sequence of steps that will verify whether the controls are working to require secure connections.
• Submit the procedure guide to this discussion forum.
2. Research the Internet on the various aspects of a malware-free security policy.
• Review the critical considerations to prepare the procedure guide.
• Organize all steps necessary for a malware-free environment.
• Provide proper justification for each step mentioned in the procedure guide.
• Submit the procedure guide document to your instructor.
3. Research the Internet to obtain information on Windows Group Policies and the Group Policy Editor.
• Review the critical considerations to prepare a procedure guide.
• Organize all the steps necessary for implementing Group Policies.
• Provide a proper justification for each step mentioned in the procedure guide.
• Submit the procedure guide to this forum.
4. Research the Internet to obtain information on MBSA and security audits.
• Review the critical considerations to prepare the procedure guide.
• Organize all the steps necessary for security audits.
• Provide a proper justification for each step mentioned in the procedure guide.
• Submit the procedure guide to this forum.
5. Search the Internet for data backup techniques.
• Review the critical considerations to prepare the procedure guide.
• Provide a proper justification for each step mentioned in the procedure guide.
• Submit the procedure guide to this forum.
6. Research the Internet to obtain information on Windows network security.
• Review the critical considerations to prepare a procedure guide.
• Organize all the steps necessary for implementing security on both a wired and wireless network.
• Provide a proper justification for each step mentioned in the procedure guide.
• Submit the procedure guide to this forum.
7. Identify the proper phase in the PDCA cycle for each security administration task discussed in the lab.
• Explain with proper reasoning how a specific administrative task helped in securing the environment.
• Submit to this discussion board.
8. Search the Internet for information on software development management policies.
• Provide requirements for securing each step of the software development process.
• Explain and give proper reasoning for each step in securing application software.
• Submit your response to this forum.
9. Search the Internet for information on securing Web servers and Web browsers.
• Provide all requirements necessary for securing the application software.
• Explain and give proper reasoning for each step to secure the application software.
• Submit your response to this forum.
10. Search the Internet for information on Windows incident-handling tools.
• Identify the correct function to secure incidents of Ken 7.
• Explain with proper reasoning your choice of the software tools to be used for Ken 7.
• Submit your response to this forum.
11. Research the Internet to obtain information on one of the following: SDLC, SCM, or Agile software development.
• Review the critical considerations to prepare a procedure guide.
• Organize all the steps necessary for implementing the method you chose.
• Provide a proper justification for each step mentioned in the procedure guide.
• Submit the procedure guide to this forum.