Secure Computing

Secure Computing

Secure Computing
Write a three-to four-page assessment in the APA format to address the following points:

  • Provide a list of 12 recommendations for establishing a secure computing environment in your company’s facility. You will also need to justify your recommendations.
  • Explain how the principles of least privileged, separation of duties, fail-safe defaults, security through obscurity, and open design work are used to ensure the best and safest computing environment in a company. Which one(s) do you recommend and why?

Submission Requirements:

  • Submit your responses in three to four pages of a Microsoft® Word document.
  • Submit your Microsoft® Project document that will include all the tasks, the resources, and the assignment of those resources.
  • Include an APA title page with all work.
  • Adhere to Standard English grammar, spelling, and punctuation requirements.
  • Use 12-point Arial or Times New Roman font.

Evaluation Criteria:
Click here to view the grading rubric for this exercise. Your submission will be evaluated against the following criteria using the grading rubric:

  • Did you include a list of 12 recommendations to establish security in a business environment?
  • Did you justify your recommendations?
  • Did you include examples?
  • Did you explain the principle of separation of duty?
  • Did you explain the principle of the least privileges?
  • Did you explain the additional security principles?
  • Did you explain how each of these principles protects the company?
  • Did you support your explanation with examples?
  • Did you follow APA formatting?

Is this the question you were looking for? If so, place your order here to get started!