Overview In the Week 3 Assignment, you assessed the security vulnerabilities of

May 17, 2024

Overview
In
the Week 3 Assignment, you assessed the security vulnerabilities of a business
application and how to address them. In last week’s lab, you determined and
configured the roles that are needed for application development and
deployment. In this assignment, you apply what you have learned by assessing
security aspects related to the implementation of your chosen application.
Preparation
Research
security-related issues for implementing your chosen software (SAP SCM)
including policies regarding implementation and management as well as
integration with an existing system.
Instructions
Do
the following:
·       
Describe the human resources (roles and skills)
required to both implement and manage your chosen software effectively. Include
the permissions/access configurations for which each role should be
provisioned.
·       
Explain the importance of 3 security policy
considerations for integrating the app with existing internal systems.
·       
Assess how well the application addresses the
following areas. Provide specific examples for support.
o   Access
Control
o   Data &
personnel isolation
o   Zero trust
The
specific course learning outcomes associated with this assignment are:
·       
Evaluate application technologies and the
security issues associated with them.
·       
Define processes for ensuring web application
security.

Are you struggling with this assignment?

Our team of qualified writers will write an original paper for you. Good grades guaranteed! Complete paper delivered to straight to your email.

GET HELP WITH YOUR PAPER