Project Part 9: Secure Windows Applications Policy

Project Part 9: Secure Windows Applications Policy


One of the security improvements for the Always Fresh IT environment is to ensure all workstations and servers run secure applications. The company needs policies that set security requirements for the software. These policies will guide administrators in developing procedures to ensure all client and server software is as secure as possible.

Specifically, you will write two policies to ensure web server software and web browsers are secure. Your policy statements will describe the goals that define a secure application.

Consider the following questions for web server software and web browsers:

1. What functions should this software application provide?

2. What functions should this software application prohibit?

3. What controls are necessary to ensure this applications software operates as intended?

4. What steps are necessary to validate that the software operates as intended?


Create two policies—one for web server software and one for web browser clients. Remember, you are writing policies, not procedures. Focus on the high-level tasks, not the individual steps.

Use the following as a guide for both policies:

· Type of application software

· Description of functions this software should allow

· Description of functions this software should prohibit

· Known vulnerabilities associated with software

· Controls necessary to ensure compliance with desired functionality

· Method to assess security control effectiveness

Required Resources

· Internet access

· Course textbook

Submission Requirements

· Format: Microsoft Word (or compatible)

· Font: Arial, size 12, double-space

· Citation Style: Follow your school’s preferred style guide

· Length: 1 to 2 pages

Self-Assessment Checklist

· I created two policies that addressed all issues.

· I followed the submission guidelines.

determine the context, order, and any linkages between the required elements listed below

 Demonstrate your understanding of Assembly in relation to other languages, your ability to apply existing ARM64 assembly mnemonics and techniques to a specific purpose, and to demonstrate the ability to….

Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).

Case Study: You have just been hired to perform digital investigations and forensics analysis for a company. You find that no policies, processes, or procedures are currently in place. Conduct….

Identify dependencies between various business areas and functions.

PROJECT TITLE Business Continuity Plan for Financial Institutions ABSTRACT Due to increase in customers’ demand, competition, 24hrs continuous service, frequent changes in regulatory policy requirements and changes in various threats….