I need help creating a thesis and an outline on Improving Security Across The Software Development. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is req

I need help creating a thesis and an outline on Improving Security Across The Software Development. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is required. Virus corrupt useful information in computer hard drives, Loss of data occurs if the computer hard drives are damaged, back up and recovery programs are best applied.

Physical security involves begin with the building itself and an assessment of perimeter vulnerability must be conducted. The organization building must have appropriate control mechanisms in place for the type of information and equipment that is stored there.&nbsp.

ii. Linkys is another suitable vendor that provides a variety of router such as WRT54G2 router, it is easy to install and enable the users to access internet connection without the use of cables and more importantly, it has firewall hat protect against unauthorized access(hackers) trying to access the network.

NB: Cisco provides better compliance which enforces market policies as well as best practices. Cisco products also are better visibility as it adapts to the emerging threats as they occur. Their products have an end to end coverage of every security issue embedded in every network product. Links, on the other hand, is a subset of Cisco and has the capacity of producing high-quality products and services essential in network security firms.

These categorically come as. computer security, application security, and network security. Computer security deals with security-related to operating systems and configuration in servers, workstations, and computers in general. Application security deals with applications in the servers. Network security deals with network and its devices. Network security is becoming a top concern since most servers and applications are connected through a network, either in a form of a local intranet and/or the Internet.

The human resource department is concerned with every aspect of security by evaluating the security status of the system regularly, I mean it could be daily, weekly or monthly depending on the system status. has become the best practice these days. The most important item is the availability of a security checklist. This document shows every activity performed, thus needs to produce a generic checklist that we use regularly.