Secure Computing
Secure Computing
Secure Computing
Write a three-to four-page assessment in the APA format to address the following points:
- Provide a list of 12 recommendations for establishing a secure computing environment in your company’s facility. You will also need to justify your recommendations.
- Explain how the principles of least privileged, separation of duties, fail-safe defaults, security through obscurity, and open design work are used to ensure the best and safest computing environment in a company. Which one(s) do you recommend and why?
Submission Requirements:
- Submit your responses in three to four pages of a Microsoft® Word document.
- Submit your Microsoft® Project document that will include all the tasks, the resources, and the assignment of those resources.
- Include an APA title page with all work.
- Adhere to Standard English grammar, spelling, and punctuation requirements.
- Use 12-point Arial or Times New Roman font.
Evaluation Criteria:
Click here to view the grading rubric for this exercise. Your submission will be evaluated against the following criteria using the grading rubric:
- Did you include a list of 12 recommendations to establish security in a business environment?
- Did you justify your recommendations?
- Did you include examples?
- Did you explain the principle of separation of duty?
- Did you explain the principle of the least privileges?
- Did you explain the additional security principles?
- Did you explain how each of these principles protects the company?
- Did you support your explanation with examples?
- Did you follow APA formatting?
Is this the question you were looking for? If so, place your order here to get started!