Computer Science
ISOL 534 Cumberlands Cloud Application Security & Evidence Collection Policy Papers

isol 534

University of the Cumberlands

ISOL

Question Description

I’m stuck on a Computer Science question and need an explanation.

TASK -1 Write about cloud application security.

TASK -2 Research methods to Secure Windows Applications Policy and write a high-level procedure guide.

TASK-3 Write about the importance of an incident response communication.

TASK-4 Write about Security in SDLC versus Agile.

TASK -5 Write about Emerging Threats.

TASK- 6 Write about Evidence Collection Policy and write a high-level procedure guide.


Important : Please use citation which you have took don't cite wrong citation which are unrelated, assignment will not be considered.

Note: Write 300 to 500 words in APA format for each task. Utilize at least two scholarly references for each task. Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. Utilize Google Scholar and/or the university library. Do not copy and paste bulleted lists. Instead, read the material and in your words, describe the recommendation citing the source. Review the rubric to see how you will be graded.


Recommended Resources

The following series of tables provide sources of supplementary information to augment your learning in digital forensics. You may consult as many resources as you wish.

Web References: Links to web references in this document and related materials are subject to change without prior notice. These links were last verified on September 25, 2019.

Books

Title

Author(s)

Year

ISBN

Getting Started with Windows Server Security

Santhosh Sivarajan

2015

978-1784398729

Group Policy: Fundamentals, Security, and the Managed Desktop

Jeremy Moskowitz

2015

978-1119035589

Mastering Windows Server 2016

Svidergol, et al.

2018

978-1119404972

Windows 10 for Enterprise Administrators: Modern Administrators' guide based on Redstone 3 version

Stokes, Singer, and Diver

2017

978-1786462824

Windows Security Monitoring: Scenarios and Patterns

Andrei Miroshnikov

2018

978-1119390640

Certification Bodies and Certifications

Organization/Certification(s)

URL

CompTIA

A+, Network+, Security+, more

https://www.comptia.org/certifications

(ISC)2

SSCP, CISSP, more

https://www.isc2.org/

Microsoft

MCSA: Windows Server, MCSE: Productivity, Microsoft 365 Certified: Security Administrator Associate, more

https://www.microsoft.com/en-us/learning/certifica...

Journals/Magazines

Title

URL

Admin Magazine

http://www.admin-magazine.com/tags/view/Windows

Windows Certified Professional Magazine

https://mcpmag.com/Home.aspx

Windows IT Pro

https://www.itprotoday.com/

Other References

Organization

URL

Microsoft Security

https://www.microsoft.com/security/blog/

SANS Internet Storm Center

http://isc.sans.edu/index.html

Security Intelligence

https://securityintelligence.com

Windows Community

https://community.windows.com/en-us/

Information Search

Use the following keywords to search for additional online resources that may be used for supporting your work on the course assignments:


  • Access control
  • Active Directory
  • Backup
  • Baseline
  • Encryption
  • Group Policy
  • Group Policy Object
  • Incident handling
  • Malware
  • Microsoft Windows administration
  • Microsoft Windows applications
  • Microsoft Windows security
  • Profile
  • Restore
  • Software Development Security Life Cycle (SDLC)
  • Threats
  • Vulnerabilities
  • Vulnerability scanning


Writing Assignment Rubric


Novice Competent Proficient
APA Style and Formatting Points: 0 (0.00%)

The assignment lacks the use of APA formatting and does not provide proper citations or includes no citations. No references page. No APA headings. No APA title page. Incorrect font or spacing.

Points: 0.25 (12.50%)

Use of APA formatting and citations of outside resources but has a few instances in which proper citations are missing. Incorrect references page or mismatched citations and references. Some APA headings. Incorrect APA title page. Partially correct font or spacing.

Points: 0.5 (25.00%)

Proper use of APA formatting. Properly and explicitly cited outside resources. Correct reference page and the reference list matches citations. APA headings are utilized to organize content. Correct APA title page. Correct font and spacing.

Organization

Points: 0 (0.00%)

Submission lacks focus or contains major drifts in focus

Points: 0.25 (12.50%)

Submissions has an organizational structure and the focus is clear throughout.

Points: 0.5 (25.00%)

Submission is well organized and has a tight and cohesive focus that is integrated throughout the document.

Writing Skills and Grammar

Points: 0 (0.00%)

Assignment does not demonstrate graduate-level proficiency in organization, grammar, and style. Assignment is poorly written and confusing. Ideas are not communicated effectively. Student paid no attention to spelling and punctuation. Demonstrates poor writing skills.

Points: 0.25 (12.50%)

Assignment demonstrates graduate-level proficiency in organization, grammar, and style. Assignment is effectively communicated, but some sections lacking clarity. Student paid some attention to spelling and punctuation, but there are errors within the writing. Needs attention to proper writing skills.

Points: 0.5 (25.00%)

Assignment strongly demonstrates graduate-level proficiency in organization, grammar, and style. Assignment is well written, and ideas are well developed and explained. Demonstrates strong writing skills. Student paid close attention to spelling and punctuation. Sentences and paragraphs are grammatically correct.

Assignment Requirements

Points: 0 (0.00%)

Did not complete the required assignment. The paper had zero or one sources. No citation. Unsupported claims and opinions.

Points: 0.25 (12.50%)

Completed portions of the assignment. The paper had one scholarly source. Few citations. Unsupported claims.

Points: 0.5 (25.00%)

Student completed all required portions of the assignment. The paper included two scholarly sources. The sources were cited appropriately. No unsupported claims were made.


Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Thank alot. You can relax a bit checking on task 1. I will send one by one for you to see them differently.

Running head: CLOUD APPLICATION SECURITY

Cloud Application Security
Student Name
Institutional Affiliation

1

CLOUD APPLICATION SECURITY

2

Cloud Application Security
Cloud application security is the governing of information stored in a cloud environment
through a series of laid out processes and policies to secure the data. The cloud environment that
enables users to store information includes slacks, Google G suite, box, and Microsoft office 365
to mention but a few. These platforms allow a user to store different sets of information, but they
are prone to unauthorized access. The safety of this information stored in the cloud applications
needs more protection called the safety net installed in the infrastructure of the network being
used. Companies are encouraged to use these zero trust security infrastructure using cloud
applications safety nets.
The leading cloud application threats that are security-related include misconfigurations
of the setups in the cloud application, hijacking of accounts, unauthorized access to application
websites, and insecure interfaces and I.P. addresses. Insecure interfaces and I.P. addresses make
the attackers work easy as they only require hacking onto the insecure I.P. through a virus
(Meng& Liu, 2020). The consistent use of the application using the same I.P. allows the attack to
access not only your accounts but also those sites, whether public or private, that your computer
has access to. In this case, the attacker’s breach `the system and can access organizational data
and account through the I.P. address. A website, server, or other arrangements will have a weak
security detail, or the firewall is easy to breach. Access and hijacking are possible too for
unauthorized persons, and these affect the security of thousands of data used by the server and
computers prone to attack, (Rose 2017).
There are developed security systems that help shield the cloud application from
predictors. The two main facilities to help through these challenges are designed proxy CASB
settings and API.API –based cloud application security platforms(CASP) used mostly used

CLOUD APPLICATION SECURITY

3

because of their ability to maintain the speed of user yet or access the internet through a broker.
The second aspect is the CASP providers that have addiction layers of security compared to
proxies. Finally, the regular updates of cloud applications make it impossible to remain authentic
but are easy to mitigate.

CLOUD APPLICATION SECURITY

4
References

Meng, Z., & Liu, H. (2020). U.S. Patent No. 10,567,422. Washington, DC: U.S. Patent and
Trademark Office.
Rose, D. C., Mukherjee, N., Simmons, B. I., Tew, E. R., Robertson, R. J., Vadrot, A. B., ... &
Sutherland, W. J. (2017). Policy windows for the environment: Tips for civilizing the
uptake of systematic acquaintance. Environmental Science & Policy.

This is Task 2. Please check it. Thank you.

Running head: SECURE WINDOWS APPLICATION POLICY

Secure Windows Applications Policy
Students Name
Institutional Affiliation

1

SECURE WINDOWS APPLICATION POLICY

2

Secure Windows Applications Policy
All organizations should procedurally define their security details. It will be easy for staff
to learn and apply in the case of an emergency that requires the implementation of the procedure.
The security strategies of a company are made by the management and brought to the staff for
implementation and testing, (Ahmad 2018). Security is an essential strategy, and their
documentation is top notch and private restricted to top organizational management and
delegat...

Dmitry (13777)
Duke University

Anonymous
Return customer, been using sp for a good two years now.

Anonymous
Thanks as always for the good work!

Anonymous
Excellent job

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4