Microsoft adheres to a defense-in-depth principle to ensure protection of its cloud services, such as Microsoft Office 365. Built-in security features include threat protection to reduce malware infections, phishing attacks, distributed denial of service (DDoS) attacks, and other types of security threats.
Answer the following question(s):
- Would an organization need to apply security controls to allow safe use of those applications? Why or why not?
Fully address the question(s) in this discussion; provide valid rationale for your choices, where applicable; and respond to at least two other students’ views.
In week 7, analyze the impact that business continuity planning has on risk management.