CIS 542 WEEK 5 DISCUSSION Question
"Web Security Verification"
Application security does not happen on its own. Organizations must recognize the value of security and make it a priority when developing applications.
- Imagine that you are the IT Security Officer for a large company, and you have been assigned the task of implementing a Web application security verification model. List the factors you find are required, at a bare minimum, to make an application secure. Review relevant sites on the Internet and describe what tools or Websites can be used to automate such an assessment. In your opinion, which approach is more reliable: manual or automated verification? Why? Provide links to any tools that you find and share them with your classmates.
- After reading a few of your classmates’ postings, reply to the ones from which you learned something new or to which you have something to add. Remember to get in early and post often.
https://hwacer.com/Tutorial/cis-542-week-5-discussion-question/
"Web Security Verification"
Application security does not happen on its own. Organizations must recognize the value of security and make it a priority when developing applications.
- Imagine that you are the IT Security Officer for a large company, and you have been assigned the task of implementing a Web application security verification model. List the factors you find are required, at a bare minimum, to make an application secure. Review relevant sites on the Internet and describe what tools or Websites can be used to automate such an assessment. In your opinion, which approach is more reliable: manual or automated verification? Why? Provide links to any tools that you find and share them with your classmates.
- After reading a few of your classmates’ postings, reply to the ones from which you learned something new or to which you have something to add. Remember to get in early and post often.
"Web Security Verification"
Application security does not happen on its own. Organizations must recognize the value of security and make it a priority when developing applications.
- Imagine that you are the IT Security Officer for a large company, and you have been assigned the task of implementing a Web application security verification model. List the factors you find are required, at a bare minimum, to make an application secure. Review relevant sites on the Internet and describe what tools or Websites can be used to automate such an assessment. In your opinion, which approach is more reliable: manual or automated verification? Why? Provide links to any tools that you find and share them with your classmates.
- After reading a few of your classmates’ postings, reply to the ones from which you learned something new or to which you have something to add. Remember to get in early and post often.
No comments:
Post a Comment
Note: only a member of this blog may post a comment.