Securing Enterprise Infrastructure: An Essay on Cybersecurity Measures

Verified

Added on  2022/09/09

|7
|1436
|17
Essay
AI Summary
Document Page
Running head: ESSAY 0
Securing the enterprise infrastructure
APRIL 3, 2020
STUDENT DETAILS:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
ESSAY 1
Most of the recent information computer systems render concurrent application of several
applications in the particular physical computing hardware (that can have manifold processing
unit). In this situation, the security of OS has main and significant concern for the users. After
considering security of operating system, it is very much essential to focus on the security of
software that run OS. In addition, there are certain Microsoft applications. It is also required to
ensure security of these applications by using different techniques. The following parts discuss
that after ensuring the security of operating system, it is required to focus on the security of
software that runs operating system. The following parts also discuss certain Microsoft
applications, and security of these applications to secure the data of application. This essay
evaluates three different techniques to secure the application.
The software security concerns the method used to regulate software that is used to run
utility software or OS that supports functioning of application and operating system (Rudolph &
Rosner, 2016). The software security means the security of the program that is either made in-
house by its user or purchased from the outside vendors. It is very essential to secure the
software after ensuring the security of operating system. Testing the security mechanism is
essential to ignore ending up with security flaw in application as well as system. It is evident that
the access control is one of the most complex and difficult security mechanism. This makes sure
that only qualified users are capable to make access of secured resources in the provided method.
This book chapter explores the landscape of access control testing and shows advances in access
control testing approaches (Tsai, Porter & Vij, 2017).
In addition, the software security solution covers the broad range in comparison of the
solution based on hardware (Stamp, 2017). The solution includes the security characteristics built
in the network operating system along with extra security software created by the OS vendor or
Document Page
ESSAY 2
third-person vendor. In this way, there are certain advantages of the software security. The main
advantage is that it is less costly in comparison of the solution based on hardware. Further, it
incorporates into the system as well as networks in simpler manner (Dieber, et. al, 2017). Even
though, the software security faces challenge of reduced performance and comparison of
hardware-depended security implementation. However, the software security renders the
complete range of methodologies to secure information and render authentication, privacy, along
with truthfulness. In addition, the reliability is considered as significant precondition to secure
the software. This is very critical to consider the unreliable security system. However, it is
simple to think about the reliable system, which can be unsecure. Measuring security
breach seems to appear recurrently in a famous news media. In this way, the security should be
the main concern of quality for the software engineer creating software system to manage the
sources of stakeholders, include intellectual properties, as well as recognise data (Seo & Lee,
2017).
The Microsoft Office is considered as suite of desktop productivity applications, which is
made specially to be utilised for use of offices or businesses. The Microsoft applications mainly
contains Microsoft word, Microsoft Power point, as well as Microsoft Excel. These applications
are mostly used by businesses (Gupta, 2018). The Microsoft word is useful for creating and
editing data. The businesses use Microsoft Excel to record expense, income, planning, budgetary
data, or financial data. In addition, the Microsoft PowerPoint is helpful for creating the
professional presentation of data. It is very much essential to secure Microsoft word, Microsoft
Excel, and Microsoft Power point for ensuring security of important data of business and others.
The first technique is to keep the windows updated. The most important thing for the entity is to
stay secures by the application of the updates operating system to every system in a quick and
Document Page
ESSAY 3
best possible manner. The main issue is that the update can need the reboot that user tends to
incapacitate. Microsoft helps the users to schedule the update. It is also helpful in delivering
different enhancements to process. It is challenging for the business to deliver updates to the
users in quick way. In this way, the entities are required to work for patching more rapidly (Gu,
et. al, 2017).
In addition, another technique is to have sign of employees on the security awareness
agreement. it can see that social engineering is the big sledgehammer cyber-attacker has. Most of
the breaches take place in the organisation. This is not because of personnel are immoral;
however, the personnel do not normally mean harms. In this way, it is very much necessary to
train whole entity on the cyber security. It will create the huge difference in today’s world. It is
required by the organisations to give security awareness training. The company should also take
thoughts of the users. The company should take sign on the security awareness agreement. The
agreement is required to contain enough information about the web access policy. It should
mention that the employees have knowledge about these security policies. Further, it is also
required to stay on the top of third party patching. The administrator is required to get more
solutions to keep the third party patching on top (Da Silva & de Barros, 2017).
As per the above analysis, it can say that it is necessary to focus on the security of
software along with operating system. in the cyber security industry, the focus has transferred
from making attack on the operating systems to making attack on the applications. In this
scenario, the security of Microsoft application becomes essential. It is concluded that different
methods should be used to secure applications. By securing the applications, the company can
secure its data as much as possible. It can say that company should focus on the updates, third
party patching as well as security awareness agreement.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
ESSAY 4
Document Page
ESSAY 5
References
Da Silva, M. P., & de Barros, R. M. (2017). Maturity Model of Information Security for
Software Developers. IEEE Latin America Transactions, 15(10), 1994-1999.
Dieber, B., Breiling, B., Taurer, S., Kacianka, S., Rass, S., & Schartner, P. (2017). Security for
the robot operating system. Robotics and Autonomous Systems, 98, 192-203.
Gu, G., Hu, H., Keller, E., Lin, Z., & Porter, D. E. (2017). Building a security OS with software
defined infrastructure. In Proceedings of the 8th Asia-Pacific Workshop on Systems (pp.
1-8)
Gupta, B. B. (2018). Computer and cyber security: principles, algorithm, applications, and
perspectives. USA: CRC Press.
Rudolph, J., & Rosner, M. (2016). U.S. Patent No. 9,390,259. Washington, DC: U.S. Patent and
Trademark Office.
Seo, D., & Lee, K. (2017). Comparing security vulnerability by operating system
environment. International Journal of Services Technology and Management, 23(1-2),
154-164.
Stamp, M. (2017). Introduction to machine learning with applications in information security.
CRC Press.
Document Page
ESSAY 6
Tsai, C. C., Porter, D. E., & Vij, M. (2017). Graphene-SGX: A Practical Library {OS} for
Unmodified Applications on {SGX}. In 2017 {USENIX} Annual Technical Conference
({USENIX}{ATC} 17) (pp. 645-658).
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]