_IT4080 - Unit 6
docx
keyboard_arrow_up
School
Capella University *
*We aren’t endorsed by this school
Course
4080
Subject
Information Systems
Date
Jan 9, 2024
Type
docx
Pages
9
Uploaded by CommodorePenguin2708
IT4080
1
Application of Software Security Controls Capella University - IT4080
Assignment 6
Janie Craig
November 11th, 2023
IT4080
2
Application of Software Security Controls A few security controls are preventive controls that will identify and try to prevent vulnerabilities. By putting certain preventive controls in place they can better mitigate the risks. Detective controls assist in alerting the security team when a breach or incident within the system has taken place. Using these security controls will assist in detection of any threats and mitigating them if found. Next, corrective controls can assist in minimizing the damage and recover any data lost. Using multi-factor authentication enhances the organizations security by requiring additional steps not just the username and password, using strong passwords, and backup data regularly. Additionally the organization should enact access restrictions and regularly monitor and log systems data tied to the organization. The organization will use firewalls as well as VPNS for remote access.
The security policy will help the organization outline how it plans to protect itself and its systems. The security policy will show how the organization systems will be maintained and protected. The policy will show it will be audited and what may need to be reviewed within the system to make sure it is functioning properly. This policy will assist in showing the standards the organization has set for itself and make sure they are followed. You can audit a software patch by auditing the management policy. Then assessing which
vulnerabilities may need to be patched, assessing the risk, and defining a roll back plan. Then testing the patch can assist in making sure the patch works before putting it into place. Making
IT4080
3
Application of Software Security Controls sure to schedule the implementation of the patch is important as it needs to be done when it will least impact the organization and deploying this patch. Monitor any system that the patch was implemented on to ensure it does not cause any issues or fail, as well as notifying the users once it is put in place, and logging all information
Once the audit has finished the recommendations to keep the organization secure and following the procedures outlined that were advised needs to be then put in place. All listed by the audit recommended need to be implemented as soon as possible by the correct department. They need to be tested and implemented during the least likely time that it will impact the organization.
Enabling automatic updates for the system or systems used can assist in mitigating risks to any applications for the organization. Limiting access and allowing employees to only access what they need to get their daily job done can assist in the mitigation of risks. Also making sure all employees understand and have reviewed all policies is an important step in keeping the organization protected from potential incidents. Using multi-factor authentication controls can protect the organization and using strong passwords can assist in mitigating risks. Making sure all employees have the proper background checks and are properly trained can assist is well.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
IT4080
4
Application of Software Security Controls Lab Screenshots U06A1
IT4080
5
Application of Software Security Controls
IT4080
6
Application of Software Security Controls U06A2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
IT4080
7
Application of Software Security Controls
IT4080
8
Application of Software Security Controls
IT4080
9
Application of Software Security Controls Sources : https://www.jpmorgan.com/insights/cybersecurity/ransomware/12-tips-for-mitigating-cyber-risk
“Update and upgrade software”
“Formalize a disaster recovery plan”
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help