University of The Cumberlands Information Security Controls Discussion Questions

Description

Microsoft adheres to a defense-in-depth principle to ensure protection of its cloud services, such as Microsoft Office 365. Built-in security features include threat protection to reduce malware infections, phishing attacks, distributed denial of service (DDoS) attacks, and other types of security threats.

Answer the following question(s):

  1. Would an organization need to apply security controls to allow safe use of those applications? Why or why not?

Fully address the question(s) in this discussion; provide valid rationale for your choices, where applicable; and respond to at least two other students’ views.