4. Privilege escalation
Adds more authority to current session than the process should
possess
Denial of service (DoS)
Slows application
Inputs that can cause unexpected results
Assuming another user’s identity
Identity spoofing
Direct file or resource access
Extra-application data access
Exploits holes in access controls
Accesses application’s data outside the application
35. 5Competitor 1.
5Competitor 2.
5Competitor 3.
5Competitor 4.
5Company Environ
5Competitive Advantages.
6SWOT ANALYSIS
6Strengths
6Weaknesses
6Opportunities
6Threats/Problems
7TARGET MARKETS
7Primary Market 1
7Primary Market 2
7Secondary Market 1
7Secondary Market 2
8MARKETINGIBUSINESS OBJECTIVES AND GOALS
9CURRENT MARKETING STRATEGY
10RESEARCH OBJECTIVES
10Main Research Questions
10Information Collected
10Possible Marketing Actions
11REFERENCES
EXECUTIVE SUMMARY
This section should be 1-2 pages and should highlight the key
takeaways from the plan at this point. You should think of it
almost like Cliff Notes. You should be able to understand the
majority of the contents of the plan by reading only this section.
Write this last!
INTRODUCTION
Hook the reader by introducing them to the problem.
Client
Brief description of the client and the main issues the client is
36. facing.
SITUATIONAL ANALYSIS
This section should describe the current situation in which your
client is operating.
Economic Forces
Description of the current economic conditions in the client’s
market.
Legal, Regulatory, and Political Forces
Description of the current legal, regulatory, and political
conditions in the client’s market.
Technological Forces
Description of the current technological conditions in the
client’s market.
Sociocultural Forces
Description of the current economic conditions in the client’s
market.
Neutral Environment
This section should describe the general business environment
that all organizations are operating in.
Competitor Environment
This section should describe the competitive environment in
which your client operates. In addition to a description of the
general competitive environment and structure it should include
a paragraph description on each competitor, specifically
highlighting what their competitive advantage is, if any.
Competitor 1.
Description
Competitor 2.
Description
Competitor 3.
37. Description
Competitor 4.
Description
Company Environ
This section should describe the company environment. It
should include a description and evaluation of the physical
facilities, the location, the staff and should highlight the
competitive advantages that the company offers.
Competitive Advantages.
SWOT ANALYSIS
Strengths
Make sure that these are positive things happening in the
organization (within the organization’s control to some extent)
that the company can utilize to take advantage of market
opportunities.
Weaknesses
Make sure that these are negative things happening in the
organization (within the organization’s control to some extent)
that the company may need to address in order maintain
profitability as an organization.
Opportunities
Make sure that these are positive things happening in the market
(external to the organization) that the company may be able to
take advantage of.
Threats/Problems
Make sure that these are negative things happening in the
market (external to the organization) that the company may
38. need to address in order maintain profitability as an
organization.
TARGET MARKETS
This section should introduce the current and potential target
markets for your client.
Primary Market 1
A description of your primary target market (i.e. the market
segment that will produce the majority of your sales).
Primary Market 2
A description of your primary target market (i.e. the market
segment that will produce the majority of your sales).
Secondary Market 1
A description of your secondary target market.
Secondary Market 2
A description of your secondary target market.
MARKETINGIBUSINESS OBJECTIVES AND GOALS
This section should describe the overall objectives, goals, and
mission of the organization. It should also specifically highlight
the marketing goals. What does your client hope to get out of
this marketing plan?
CURRENT MARKETING STRATEGY
This section should highlight the current marketing strategy that
is being utilized by your client. It should include specific
tactics that are currently be used, the performance of those
tactics, and the current budget for marketing available.
RESEARCH OBJECTIVES
39. This section should highlight the main reasons for undergoing
research. What are the existing problems with data collection
and analysis at your client?
Main Research Questions
This section should list the main research questions that will be
answered by primary and secondary research. It should adhere
to the following guidelines:
Main research question 1
Sub question 1 and hypothesis, if any
Sub question 2 and hypothesis, if any
Main research question 2
Sub question 1 and hypothesis, if any
Sub question 2 and hypothesis, if any
Main research question 3
Sub question 1 and hypothesis, if any
Sub question 2 and hypothesis, if any
Information Collected
For each sub question, you should highlight the information
(i.e. actual questions or data) that will be collected and how it
will be collected. Be specific in explaining the primary or
secondary method that will be used and the sampling
40. methodology.
Possible Marketing Actions
This section should highlight the marketing actions that could
potentially result from either confirming or disconfirming your
hypotheses. This should be more of a brainstorm of marketing
tactics at this point based on possible outcomes.
REFERENCES
These should be in standard APA format.
Part 1
Microsoft adheres to a defense-in-depth principle to ensure
protection of its cloud services, such as Microsoft Office 365.
Built-in security features include threat protection to reduce
malware infections, phishing attacks, distributed denial of
service (DDoS) attacks, and other types of security threats.
Answer the following question(s):
Would an organization need to apply security controls to allow
safe use of those applications? Why or why not?
Fully address the question(s) in this discussion; provide valid
rationale for your choices, where applicable; and respond to at
least two other students’ views.
To complete this assignment, you must do the following
A) Create a new thread.
B) Select AT LEAST 3 other students' threads and post
substantive comments on those threads, evaluating the pros and
cons of that student’s recommendations.
Your comments should extend the conversation started with the
thread.
ALL original posts and comments must be substantive. (I'm
looking for about a paragraph - not just "I agree.")
NOTE: These discussions should be informal discussions, NOT
research papers. If you MUST directly quote a resource, then
cite it properly. However,
41. I would much rather simply read your words.
Part 2
Submission Requirements
? Format: Microsoft Word (or compatible)
? Font: Arial, size 12, double-space
? Citation Style: APA
? Length: 2 page
? APA Format
? No resources before 2015
? Must complete all parts to answer the questions
? Don’t Write questions in the paper
? Write proper heading to paragraphs in APA format
Scenario
One of the security improvements for the "Your Company"
environment is to ensure all workstations and servers run secure
applications. The company needs policies that set security
requirements for the software. These policies will guide
administrators in developing procedures to ensure all client and
server software is as secure as possible.
Specifically, you will write two policies to ensure web server
software and web browsers are secure. Your policy statements
will describe the goals that define a secure application. For this
project - you will write the web server software policy!!
Consider the following questions for web server software and
web browsers:
1. What functions should this software application provide?
2. What functions should this software application prohibit?
3. What controls are necessary to ensure this applications
software operates as intended?
4. What steps are necessary to validate that the software
operates as intended?TasksCreate two policies — one for web
server software and one for web browser clients. Remember,
you are writing policies, not procedures. Focus on the high-
level tasks, not the individual steps.
42. Use the following as a guide for both policies:
▪ Type of application software
▪ Description of functions this software should allow
▪ Description of functions this software should prohibit
▪ Known vulnerabilities associated with software
▪ Controls necessary to ensure compliance with desired
functionality
▪ Method to assess security control effectiveness
Part 3
Submission Requirements
? Font: Arial, size 12, double-space
? Citation Style: APA
? Length: 2 page
? APA Format
? No resources before 2015
? Must complete all parts to answer the questions
? Don’t Write questions in the paper
? Write proper heading to paragraphs in APA format
Scenario
One of the security improvements for the "Your Company"
environment is to ensure all workstations and servers run secure
applications. The company needs policies that set security
requirements for the software. These policies will guide
administrators in developing procedures to ensure all client and
server software is as secure as possible.
Specifically, you will write two policies to ensure web server
software and web browsers are secure. Your policy statements
will describe the goals that define a secure application. For this
project - you will write the web browser policy!!
Consider the following questions for web server software and
web browsers:
1. What functions should this software application provide?
2. What functions should this software application prohibit?
3. What controls are necessary to ensure this applications
43. software operates as intended?
4. What steps are necessary to validate that the software
operates as intended?TasksCreate two policies — one for web
server software and one for web browser clients. Remember,
you are writing policies, not procedures. Focus on the high-
level tasks, not the individual steps.
Use the following as a guide for both policies:
▪ Type of application software
▪ Description of functions this software should allow
▪ Description of functions this software should prohibit
▪ Known vulnerabilities associated with software
▪ Controls necessary to ensure compliance with desired
functionality
▪ Method to assess security control effectiveness