Describe at least two (2) control strategies you would consider implementing for securing the company’s web-based infrastructure.

Discuss the way communication technologies can enhance coordination of care by interprofessional teams.
June 4, 2022
Describe at least three (3) threats and vulnerabilities associated to physical security.
June 4, 2022

Describe at least two (2) control strategies you would consider implementing for securing the company’s web-based infrastructure.

Describe at least two (2) control strategies you would
consider implementing for securing the company’s web-based infrastructure.

IT 3358: Unit 4 Assignment OS and Application Security Strategy

For this assignment, you will explain how to secure your
applications and operating systems through the use of various security tools.
For this assignment, use the suggested resources, the Capella library, and the
Internet to research the subject matter.

Instructions

For this assignment, complete the following components to
secure your applications and operating systems:

Describe threats and vulnerabilities associated with at
least two (2) operating systems.

Describe an anti-malware solution for the organization and
indicate on which operating systems it supports.

Select a suitable intrusion detection system (IDS) solution
for the organization and explain the reasoning for your suggestion.

Describe at least two (2) control strategies you would
consider implementing for securing the company’s web-based infrastructure.

Describe at least two (2) control strategies you would
consider implementing for securing the company’s database infrastructure.

Define two (2) items that you would include in the
organization’s operating system security hardening procedures.

You are encouraged to provide resources and citations. Any
references should be formatted according to APA (6th Edition) Style and
Formatting.

Follow the scoring guide and submit to the assignment
section once completed.