The objective of this discussion is to understand the threat and vulnerability of the Microsoft operating systems and to find ways to mitigate the security breach. Microsoft operating system is widely used in various organizations and finding strategies to defend against an attack is becoming difficult. DQ1: Therefore, your task is to read the chapter one of our book titled “security strategies in windows platforms and application” and layout strategies you could use to mitigate the risk of an attack in Microsoft windows platform. DQ2: Discuss the telnets of information security and how windows and application could be mapped into a typical IT Infrastructure that could help to secure the system? Note: All discussions must adhere to APA 6th edition format.Please, do not post more than 250 words for the discussion. Please, don't forget to create in-text citations before referencing any articl. The objective of this discussion is to understand the threat and vulnerability of the Microsoft operating systems and to find ways to mitigate the security breach. Microsoft operating system is widely used in various organizations and finding strategies to defend against an attack is becoming difficult.
DQ1: Therefore, your task is to read the chapter one of our book titled “security strategies in windows platforms and application” and layout strategies you could use to mitigate the risk of an attack in Microsoft windows platform.
DQ2: Discuss the telnets of information security and how windows and application could be mapped into a typical IT Infrastructure that could help to secure the system?
Note: All discussions must adhere to APA 6th edition format.Please, do not post more than 250 words for the discussion. Please, don’t forget to create in-text citations before referencing any articl