Application-and-Database-Security-Mitigations-
- Read Jack’s Wine and Coffee Shop – A Start-Up Case Study, linked in the Resources under the Required Resources heading.
Deliverable
Write 4–6 pages identifying application and database security mitigations that will support the selection of the proper technology for the business detailed in the case study.
- Describe the role of a defense in depth and layered defenses in creating security synergy.
- Describe technical and procedural mitigations for software development and maintenance security.
- Describe commonly used authentication methods that function as application and database security mitigations.
- Describe the security implications of commonly used file systems.
- Identify common database and DBMS vulnerabilities and controls.
Additional Requirements
- Written communication: Written communication is free of errors that detract from the overall message.
- APA formatting: Use current APA style and formatting guidelines.
- Length: 4–6 pages, excluding the references page.
- Font and font size: Times New Roman, 12 point.
Criteria | Non-performance | Basic | Proficient | Distinguished |
---|---|---|---|---|
Describe the role of a defense in depth and layered defenses in creating security synergy. |
Does not describe the role of a defense in depth and layered defenses in creating security synergy. | Describes incompletely or inaccurately the role of a defense in depth and layered defenses in creating security synergy. | Describes the role of a defense in depth and layered defenses in creating security synergy. | Describes the role of a defense in depth and layered defenses in creating security synergy, including the use of supporting examples. |
Describe technical and procedural mitigations for software development and maintenance security. |
Does not describe technical and procedural mitigations for software development and maintenance security. | Describes incompletely or inaccurately technical and procedural mitigations for software development and maintenance security. | Describes technical and procedural mitigations for software development and maintenance security. | Describes technical and procedural mitigations for software development and maintenance security, including the use of supporting examples. |
Describe commonly used authentication methods that function as application and database security mitigations. |
Does not describe commonly used authentication methods that function as application and database security mitigations. | Describes, incompletely or inaccurately, commonly used authentication methods that function as application and database security mitigations. | Describes commonly used authentication methods that function as application and database security mitigations. | Describes commonly used authentication methods that function as application and database security mitigations, including the use of supporting examples. |
Describe the security implications of commonly used file systems. |
Does not describe the security implications of commonly used file systems. | Describes incompletely or inaccurately the security implications of commonly used file systems. | Describes the security implications of commonly used file systems. | Describes the security implications of commonly used file systems, including the use of supporting examples. |
Identify common database and DBMS vulnerabilities and controls. |
Does not identify common database and DBMS vulnerabilities and controls. | Identifies incompletely or inaccurately common database and DBMS vulnerabilities and controls. | Identifies common database and DBMS vulnerabilities and controls. | Identifies common database and DBMS vulnerabilities and controls, including the use of supporting examples. |