2 questions needing answered

User Generated

VGjnaanor

Computer Science

Description

1. Describe the role that application security policies play in ensuring that applications are not hacked.

2. Describe, compare and contrast ping, nmap, and nessus. Be sure to include how each type of tool fits into a layered security effort.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Here you go! Let me know if you need any edits or have any questions

Running head: APPLICATION SECURITY POLICIES

Application Security Policies
Name
Institution Affiliation:
Date:

1

APPLICATION SECURITY POLICIES

2

Role of Application Security Policy
Application security policies and strategies are very important tools in ensuring that
applications are not hacked or compromised. There are increased challenges that organizations
face with their applications because they are not only on the desktop computers that companies
own but also on other mobile devices owned by the employees and on the cloud. These realities
increase the risk of hacking these applications. Application security policies help to take all these
realities and the sophistication of hackers into account to come up with efficient ways to improve
the security of the applications. These policies help in providing guidelines for reviewing any
vulnerability within the application before it is deployed. It provides ways in wh...

Related Tags