December 14, 2020
  • From the e-Activity, discuss how standards for encryption modules and algorithms benefit the furtherance of Web application security. As the corporate ISSO, assess how you can ensure that a vendor’s Web Server product implements an adequate security methodology.
  • As the corporate ISSO, determine how you would ensure that Web applications are compliant with the applicable security standards.  Select one such standard and explain how you would keep it in compliance.