Description
In an essay, review the following statements:
- Once your operating system is secure, you can focus on securing the software that runs in the operating system.
- Evaluate some of the most popular Microsoft applications and analyze how to make an application more secure to protect your organization’s data. Describe at least three (3) techniques used to secure an application.
Provide information from your readings to support your statements.
Deliverables:
Well-written essay should be 4-5 pages in length, incorporating at least two academic resources. Cite all sources using APA style guidelines, citing references as appropriate.
Explanation & Answer
i have made some adjustments on the above paper,therefore uploading the final work
Running head: SOFTWARE SECURITY
1
Software security
Name
Course details
Instructor
Institution
Date
SOFTWARE SECURITY
2
Over the last few years, cyber security has been a big has been a significant threat to
organizations. People have become so smart that they remotely access your system without leaving
back any trace. Therefore, calling for software security. Software security is an idea put into place
to ensure that computer software that is operating system and applications are protected from
hackers and malicious attack making the software not to function effectively. Despite significant
progress in recent times, software insecurity remains a substantial problem. To determine how to
curb it. This paper will explore and examine various ways and techniques to make operating system
software and application software safe and secure.
An Operating system is a type of software that gives support to computer's essential
functions such as task scheduling and controlling peripheral devices. In present times, the operating
system is more complicated and have advanced features than ever before, this is helpful to the
organization and at the same time bring with it security nightmares. Consequently, a secure
operating system environment enables an application to run smoothly, and any weakness in it could
comprise the integrity of the application. Therefore, it is necessary for it to be monitored,
adequately administered and configured effectively making it very stable, controlling access, and
appropriately secured before focusing on software that runs in the operating system
(Ramachandran,2016). Have you ever imagined a computer without advanced and user-friendly
operating system? Well, I know you cannot appreciate this may be because you didn't have a taste
of how hectic using command prompts were in early years of operating system evolution. Securing
OS should not be done manually, it should be centralized and automated correctly.
An organization that embraces proper techniques for securing an operating system saves a
lot from thefts of information to unauthorized logins; it keeps on costs for hiring maintenance staff
here and then. There exist various best practices for protecting the operating system. First, an
enterprise should employ an administrator who permits user account...
Review
Review
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Similar Content
Related Tags
Untamed
by Glennon Doyle
Fools Crow
by James Welch
To the Lighthouse
by Virginia Woolf
Frankenstein
by Mary Shelley
The Iliad
by Homer
Blink
by Malcolm Gladwell
Shattered - Inside Hillary Clintons Doomed Campaign
by Amie Parnes and Jonathan Allen
Little Fires Everywhere
by Celeste Ng
The House of the Seven Gables
by Nathaniel Hawthorne