In: Computer Science
APPLICATION Security Policies / Enterprise Security Strategy Plan
Instructions: In NO LESS than 200 words, answer the following question.
Create an outline that could serve as a template for creating future security policies for an IT Network's Applications. Your template should reflect2–3 key parts of a security policy related to intranet operations.
For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want to borrow elements from an actual security policy from a company; however,ORIGINAL WORK IS A MUST.
The following are suggestions of items to consider as key parts of a security policy:
Threat
Policy statement
Responsibilities
Guidelines and user procedure
Information technology procedures
Compliance and enforcement
Application Security:
As, the world is moving towards the smaller devices which are being more effective than the larger devices. One of the most important of all the devices is mobile phones which is been successful in replacing the laptops and computers. As, the use of phones increased there was mere need of getting application security as the utmost thing for the protection of the applications for smoothing the use of the phones.
Threats:
How to Secure Applications?
Responsibilities:
Hence, these are the things one must remember while using the mobile applications.