1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flura [38]
3 years ago
8

Part of implementing Ken 7 Windows Limited new enterprise resource planning (ERP) software is ensuring all workstations and serv

ers run secure applications. Since the ERP software is new, Ken 7 Windows Limited needs a new policy to set security requirements for the software. This policy will guide administrators in developing procedures to ensure all client and server software is as secure as possible. The goal is to minimize exposure to threats to any part of the new ERP software or resources related to it. Using the format below, describe the goals that define a secure application. Specifically, you will write two policies to ensure Web browsers and Web servers are secure. All procedures and guidelines will be designed to fulfill the policies you create. Answer the following questions for Web browser and Web server software:What functions should this software application provide?What functions should this software application prohibit?What controls are necessary to ensure this applications software operates as intended?What steps are necessary to validate that the software operates as intended?
Computers and Technology
1 answer:
spayn [35]3 years ago
3 0

Answer:

Explanation:

1) The Functions a software application provide to keep a web browser secured includes:

a) The web browser should always be updated, you can keep it on "automatic update" option enable on your browser settings so that it will be automatically updated whenever the browser gets an update.

b) Always keep the third party cookies disabled because of the many unauthorized and phishing sites over the internet. This leaves the browser unsafe and cause higher security risk so block all the third party sites and cookies from the browser.

2) The Functions a software application prohibit to keep a web browser secured includes:

a) Do not store passwords on your web browser, deny the "store password" option on your browser settings. This is very important Even if you store passwords on your web browser do set a very strong master password to access all the stored passwords.

b) Don't ever click on unwanted and unknown hyperlinks. There will be many unsolicited attachments, files, etc over the internet please do not open or download it unnecessarily.

3) The functions a software application should provide to keep a web server secured includes:

a) Always using an application scanner. Whenever you install or download any new applications, scan the application before accessing it or opening it.

b) Install all the security patches to keep off hackers as they are many on the internet.

4) The Functions a software application should prohibit to keep a web server secured includes:

1) Uninstall an application that has not been used for long time, because they are actually of no use.

b) There may be scripts, files, setups, codes stored on the web server unknowingly so do check it and delete all the sample scripts, files and codes from the web server.

You might be interested in
What is done to conserve energy while electricity is being transported?
Mars2501 [29]

Answer:using public transport instead of individual vehicles. Switching off electricity when not in use. By using power saving devices

Explanation:

3 0
3 years ago
Stress is an illness not unlike cancer.<br> True<br> False
LiRa [457]

Answer:

... not unlike cancer.

Explanation:

so we have a double negative so it makes it a positive, so that would basically mean like cancer

so false i think

8 0
3 years ago
Read 2 more answers
Write python code that does the following.
Mariulka [41]

Answer:

the answers are in front of you it is correct to follow the steps

¯\_(ツ)_/¯:

5 0
3 years ago
Which process is a feature of webmail?
GalinKa [24]
Your mail gets sent across the internet to the other person you mailed to.
7 0
3 years ago
The set of instructions that directs the computer to perform a variety of tasks is known as a
Vilka [71]
Answer: software (answer not long enough)
5 0
3 years ago
Other questions:
  • Commands are organized into tabs on the A. Ribbon. B. Quick Access toolbar. C. Status bar. D. ruler.
    13·2 answers
  • Which database item would show details such as a customer’s name, their last purchase, and other details about a customer
    14·2 answers
  • Examples of apps include pop-up windows, validation of webform inpts and images that change when a cursor passes over them
    12·1 answer
  • What happens if you never confirm your facebook account?
    8·1 answer
  • How many bits does it take to represent the values from 0 to 255?
    9·1 answer
  • The birthday problem is as follows: given a group of n people in a room, what is the probability that two or more of them have t
    12·1 answer
  • What one main difference between social media and traditional media such as television?
    12·2 answers
  • What is the best resource to learn python?
    14·2 answers
  • If you need any answer answered faster check out Wolframalpha.com
    14·2 answers
  • Cho 1 biến x thuộc kiểu dữ liệu Integer , hãy cho biết biến x dùng để làm gì?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!