ESSAY1 Mostof the recent information computer systems render concurrent application of several applications in the particular physical computing hardware (that can have manifold processing unit). In this situation, thesecurityofOShas main and significant concern for the users. After considering security of operating system, it is very much essential to focus on the security of software that run OS. In addition, there are certain Microsoft applications. It is also required to ensure security of these applications by using different techniques. The following parts discuss that after ensuring the security of operating system, it is required to focus on the security of software that runs operating system. The following parts also discuss certain Microsoft applications, and security of these applications to secure the data of application. This essay evaluates three different techniques to secure the application. The software securityconcerns the method used to regulate software that is used to run utility software or OS that supports functioning of application and operating system (Rudolph & Rosner, 2016). The software security means the security of the program that is either made in- house by its user or purchased from the outside vendors. It is very essential to secure the software after ensuring the security of operating system. Testing the security mechanism is essential to ignore ending up with security flaw in application as well as system. It is evident that the access control is one of the most complex and difficult security mechanism. This makes sure that only qualified users are capable to make access of secured resources in the provided method. This book chapter explores the landscape of access control testing and shows advances in access control testing approaches (Tsai, Porter & Vij, 2017). In addition, the software securitysolution covers the broad range in comparison of the solution based on hardware (Stamp, 2017). The solution includes the security characteristics built in thenetwork operating systemalong with extra security software created by the OS vendor or
ESSAY2 third-person vendor. In this way, there are certain advantages of the software security. The main advantage is that it is less costly in comparison of the solution based on hardware. Further, it incorporates into the system as well as networks in simpler manner (Dieber, et. al, 2017). Even though, the software security faces challenge of reduced performance and comparison of hardware-depended security implementation. However, the software security renders the complete range of methodologies to secure information and render authentication, privacy, along with truthfulness. In addition, the reliability is considered as significant precondition to secure thesoftware. This is very critical to consider the unreliable security system. However, it is simple to think about the reliable system, which can be unsecure. Measuring security breachseems to appear recurrently in a famous news media. In this way, the security should be the main concern of quality for the software engineer creating software system to manage the sources of stakeholders, include intellectual properties, as well as recognise data (Seo & Lee, 2017). The Microsoft Officeis considered as suite of desktop productivityapplications, which is made specially to be utilised for use of offices or businesses.The Microsoft applications mainly contains Microsoft word, Microsoft Power point, as well as Microsoft Excel. These applications are mostly used by businesses (Gupta, 2018). The Microsoft word is useful for creating and editing data. The businesses use Microsoft Excel to record expense, income, planning, budgetary data, or financial data. In addition, the Microsoft PowerPoint is helpful for creating the professional presentation of data. It is very much essential to secure Microsoft word, Microsoft Excel, and Microsoft Power point for ensuring security of important data of business and others. The first technique is to keep the windows updated. The most important thing for the entity is to stay secures by the application of the updates operating system to every system in a quick and
ESSAY3 best possible manner. The main issue is that the update can need the reboot that user tends to incapacitate. Microsoft helps the users to schedule the update. It is also helpful in delivering different enhancements to process. It is challenging for the business to deliver updates to the users in quick way. In this way, the entities are required to work for patching more rapidly (Gu, et. al, 2017). In addition, another technique is to have sign of employees on the security awareness agreement. it can see that social engineering is the big sledgehammer cyber-attacker has. Most of the breaches take place in the organisation. This is not because of personnel are immoral; however, the personnel do not normally mean harms. In this way, it is very much necessary to train whole entity on the cyber security. It will create the huge difference in today’s world. It is required by the organisations to give security awareness training. The company should also take thoughts of the users. The company should take sign on the security awareness agreement. The agreement is required to contain enough information about the web access policy. It should mention that the employees have knowledge about these security policies. Further, it is also required to stay on the top of third party patching. The administrator is required to get more solutions to keep the third party patching on top (Da Silva & de Barros, 2017). As per the above analysis, it can say that it is necessary to focus on the security of software along with operating system. in the cyber security industry, the focus has transferred from making attack on the operating systems to making attack on the applications. In this scenario, the security of Microsoft application becomes essential. It is concluded that different methods should be used to secure applications. By securing the applications, the company can secure its data as much as possible. It can say that company should focus on the updates, third party patching as well as security awareness agreement.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
ESSAY5 References Da Silva, M. P., & de Barros, R. M. (2017). Maturity Model of Information Security for Software Developers.IEEE Latin America Transactions,15(10), 1994-1999. Dieber, B., Breiling, B., Taurer, S., Kacianka, S., Rass, S., & Schartner, P. (2017). Security for the robot operating system.Robotics and Autonomous Systems,98, 192-203. Gu, G., Hu, H., Keller, E., Lin, Z., & Porter, D. E. (2017). Building a security OS with software defined infrastructure. InProceedings of the 8th Asia-Pacific Workshop on Systems(pp. 1-8) Gupta, B. B. (2018).Computer and cyber security: principles, algorithm, applications, and perspectives. USA: CRC Press. Rudolph, J., & Rosner, M. (2016).U.S. Patent No. 9,390,259. Washington, DC: U.S. Patent and Trademark Office. Seo, D., & Lee, K. (2017). Comparing security vulnerability by operating system environment.International Journal of Services Technology and Management,23(1-2), 154-164. Stamp, M. (2017).Introduction to machine learning with applications in information security. CRC Press.
ESSAY6 Tsai, C. C., Porter, D. E., & Vij, M. (2017). Graphene-SGX: A Practical Library {OS} for Unmodified Applications on {SGX}. In2017 {USENIX} Annual Technical Conference ({USENIX}{ATC} 17)(pp. 645-658).