In an essay, review the following statements based on the readings from this weekâ€™s module:
- Once your operating system is secure, you can focus on securing the software that runs in the operating system.
- Evaluate some of the most popular Microsoft applications and analyze how to make an application more secure to protect your organizationâ€™s data. Describe at least three techniques used to secure an application.
Provide information from your readings to support your statements.
Your well-written essay should be 4-5 pages in length, not including the cover and reference pages, incorporating at least two academic resources from the Library in addition to the case study. Cite all sources using Saudi Electronic University academic writing standards and APA style guidelines found in the Library, citing references as appropriate.
It is strongly encouraged that you submit all assignments to the TurnItIn Originality Check prior to submitting it to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the TurnItIn Originality Check â€“ Student Guide for step-by-step instructions.