Question

In: Computer Science

APPLICATION Security Policies / Enterprise SecurityStrategy PlanInstructions: In NO LESSthan 200 words, answer...

APPLICATION Security Policies / Enterprise Security Strategy Plan

Instructions: In NO LESS than 200 words, answer the following question.

Create an outline that could serve as a template for creating future security policies for an IT Network's Applications. Your template should reflect2–3 key parts of a security policy related to intranet operations.

For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want to borrow elements from an actual security policy from a company; however,ORIGINAL WORK IS A MUST.

The following are suggestions of items to consider as key parts of a security policy:

Threat

Policy statement

Responsibilities

Guidelines and user procedure

Information technology procedures

Compliance and enforcement

Solutions

Expert Solution

Application Security:

As, the world is moving towards the smaller devices which are being more effective than the larger devices. One of the most important of all the devices is mobile phones which is been successful in replacing the laptops and computers. As, the use of phones increased there was mere need of getting application security as the utmost thing for the protection of the applications for smoothing the use of the phones.

Threats:

  • The threats in the applications are same as that for any of the device which is being connected to the internet and it becomes more easy and swift to threat the mobile applications.
  • The major things that are encountered in the application hacking are as follows:
    • Injections
    • Broken Authentication & Session Management
    • Cross-Site Scripting
    • Insecure Direct Object References
    • Security Misconfiguration
    • Missing Function Level Access Control
    • CSRF(Cross Site Request Forgery)
    • Unvalidated Redirects & Forwards
  • The threats in the applications are very severe and recovering through such hacks sometimes becomes very complicated for the experts to recover the data and manage the application back to how it was.

How to Secure Applications?

  • To secure the mobile applications from getting hacked the most important step is to secure the applications code from the ground up.
  • The next and most important step is to secure the network connections that are being handled on the back end of the applications.
  • Next is to enable identification, authentication and the authorization measures in the best place.
  • There must be implementation of the best encryption technology to gather the customer data and must be kept secured.
  • There must be also an implementation of the solid API security strategy that is being placed in the applications.
  • Testing the app till the perfection is achieved is the key to make an application solid and unhackable.

Responsibilities:

  • The responsibilities of an user is to secure the connection while using internet without any of the mobile devices and always visit the safer sites and manage the connection properly.
  • Must stay connected to a secure network and must never provide sensitive information in plain text. There must be always taken care of the formation of the valid and forbidable vulenrabilites.

Hence, these are the things one must remember while using the mobile applications.


Related Solutions

E-MAIL Security Policies / Enterprise Security StrategyPlanInstructions: In NO LESSthan 200 words, answer...
E-MAIL Security Policies / Enterprise Security Strategy PlanInstructions: In NO LESS than 200 words, answer the following question.Create an outline that could serve as a template for creating future security policies for an IT Network's E-MAIL functionality. Your template should reflect 2–3 key parts of a security policy related to intranet operations.For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want to borrow elements from...
INTERNET USE Security Policies / Enterprise SecurityStrategy PlanInstructions: In NO LESSthan 200 words,...
INTERNET USE Security Policies / Enterprise Security Strategy PlanInstructions: In NO LESS than 200 words, answer the following question.Create an outline that could serve as a template for creating future security policies for an IT Network's Internet Use. Your template should reflect2–3 key parts of a security policy related to intranet operations.For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want to borrow elements from...
ACCESS CONTROLS Security Policies / Enterprise Security Strategy Plan Instructions: In NO LESS than 200 words,...
ACCESS CONTROLS Security Policies / Enterprise Security Strategy Plan Instructions: In NO LESS than 200 words, answer the following question. Create an outline that could serve as a template for creating future security policies for an IT Network's Access Controls. Your template should reflect 2–3 key parts of a security policy related to intranet operations. For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want...
Audits and Compliance / Enterprise Security Strategy Plan Instructions: In NO LESS than 400 words, answer...
Audits and Compliance / Enterprise Security Strategy Plan Instructions: In NO LESS than 400 words, answer the following question. Compare and contrast audits and assessments. •Pick at least 3 things that are the same and 3 things that are different. •Compare the goals, the timing, and the roles that are involved.
write an essay about J2EE Security? 200 words what is sql injection in 200 words?
write an essay about J2EE Security? 200 words what is sql injection in 200 words?
Describe the application of policies and procedures to managing accounting information(150- 180 words)
Describe the application of policies and procedures to managing accounting information(150- 180 words)
1: Understand the application of professional knowledge and skills in the workplace (max. 200 words). •...
1: Understand the application of professional knowledge and skills in the workplace (max. 200 words). • As a professional accountant, how would the process for completing the practice set assignment (a manual accounting process) be used in an accounting department. Explain whether communication, teamwork, time management and interpersonal skills play a role in completing this process within an accounting department? • When (why) would you use this manual accounting system rather than a computerised accounting system? • What are the...
Implementation, Operations, and Monitoring / Enterprise Security Strategy Plan Instructions: In NO LESS than 400 words,...
Implementation, Operations, and Monitoring / Enterprise Security Strategy Plan Instructions: In NO LESS than 400 words, answer the following question. Regarding the implementation of a security plan, this can be anything from the organizational change management aspects (users) or the technical implementation (information technology staff),Select 2 key areas to either engage in the normal, everyday operations of a security team, or 2 key areas to monitor, and why. Describe and evaluate each key area. 200 words requirement for each.
Write a paragraph of minimum 125 words about: What is enterprise application integration (EAI)? What types...
Write a paragraph of minimum 125 words about: What is enterprise application integration (EAI)? What types of EAI projects occur in organizations? What is the importance of proper lifecycle iterations in an EAI project?
PLEASE ANSWER WITH 200 WORDS OR MORE FOR A THUMBS UP RATING! THANK YOU! In 200...
PLEASE ANSWER WITH 200 WORDS OR MORE FOR A THUMBS UP RATING! THANK YOU! In 200 words or more, please explain why angel investments are important. *NOTICE* I do NOT need a definition of what angel investors are, I just need to know why angel investing is important
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT