When deploying any system or application steps should be
taken to protect them from misuse, abuse, or attack. Based on your research and
this week’s readings, discuss some of the necessary tasks that are associated
with deploying a system or application. In your discussion, answer the
questions below.
How do you know when good is good enough?
How does hardening affect business operations?
What is the responsibility of security to the
business for
both security and usability?
How can missteps affect the business perception
of the security organization?
Do you need help with this assignment or any other? We got you! Place your order and leave the rest to our experts.