Running Head: Practical Connections Paper 1 Executive Progra ✓ Solved

Running Head Practical Connections Paper 1executive Program Practic

Executive Program Practical Connection Assignment Application Security ISOL-534-41 Name University of the Cumberlands Prof. Name Application security course has been very interesting for me so far and I have learned many new things related to IT security. I already have good experience in my previous company for most of the topics I learned in this course such as managing Active Directory, Group Policy, Group Policy Object, Windows systems administrations, etc. Knowledge of application security policies plays most essential role for securing network and system in any organization. I think I have gained good command on security topic after taking this course and will help me to apply my knowledge in my current or future companies.

The course content has been well defined and well balanced for student like us who are inspired to make their career in application securities. The lab assignments of this course have helped me to apply practical knowledge which I have learned so far in this course. In my previous company I was working as Systems Engineer and I used to create new user accounts in Active Directory and provide them access as required for their roles, just like we did in Lab 01 assignment. In addition, I have worked on creating Virtual Machines for clients and install different application into the VM servers. I have also worked and managed on Citrix Severs including publishing and assigning the user permissions to access the Applications in Citrix Management Console.

In this course I have learned how to secure applications, operating systems, databases, network and systems. In addition, the lab assignments have practically helped me on encryption policies used for password, files or disk. We have also studied various tools and technologies for encryption of Microsoft windows, different methodologies for encryption, malware and how to defend Microsoft windows against malware using antivirus and anti-spyware applications, malware prevention strategies. Our residency research topic is BYOD and I have learned many positive and negative aspects of using BYOD devices. We have also studied various tools and technologies for encryption of Microsoft windows, different methodologies for encryption, malware and how to defend Microsoft windows against malware using antivirus and antispyware applications, malware prevention strategies.

Our residency research topic is BYOD and I have learned many positive and negative things during our research about this topic. The discussion topics for this course also helped me understand about information securities and its management, and how other students are using it in their organizations. In my current company, we use two factor authorization to login to our systems and/or applications, which makes login authentication more secure. The tools which we use to generate passcodes for login are Entrust and Duo Mobile. My current job role is not directly related to application security, but it is related to managing client’s applications.

I have done certifications such as CCNA (CISCO Certified Network Associate), MCITP (Microsoft Certified IT Professional), CCA (Citrix Certified Associate) and ITIL which are somewhat related to the IT security. Hence, I got more interested in taking this course which will help me to get better job in application security field. The knowledge which I gained in this course will help me to proactively identity and mitigates against any possible threats and vulnerabilities in an organization.

Sample Paper For Above instruction

Application security is a critical domain within information technology (IT) that focuses on safeguarding applications against threats and vulnerabilities to ensure data integrity, confidentiality, and availability. As organizations increasingly rely on digital solutions, understanding the fundamentals and practical applications of security measures is vital for IT professionals aiming to enhance organizational security posture.

Introduction to Application Security

Application security involves implementing measures throughout the software development and deployment process to prevent threats such as unauthorized access, data breaches, and malicious attacks. It encompasses a wide range of practices, including secure coding, vulnerability assessment, encryption, and access control mechanisms. As a participant in the ISOL-534-41 course, I have gained essential insights into these security practices, supported by practical lab assignments that simulate real-world scenarios.

Personal Experience and Practical Application

My prior experience as a Systems Engineer has provided a foundational understanding of Windows system administration, Active Directory management, and user access provisioning. This background complements the course content, where I learned to create and manage user accounts, enforce security policies, and administer virtual machines. For instance, in Lab 01, I created new user accounts in Active Directory and assigned appropriate permissions, mirroring real organizational tasks.

Furthermore, my hands-on involvement with Citrix Server management, including publishing applications and managing user permissions, illustrates practical application of application security principles in enterprise environments. These experiences reinforce the importance of securing applications and systems at multiple levels.

Security Strategies and Technologies Learned

The course emphasized various security strategies essential for protecting organizational assets. These include encryption policies, malware defense mechanisms, and authentication protocols. Encryption techniques for passwords, files, or disks are critical for maintaining data confidentiality. I learned different encryption methodologies for Windows systems, enhancing my ability to implement secure configurations.

Moreover, combatting malware involves deploying antivirus and anti-spyware tools, understanding malware behaviors, and adopting malware prevention strategies. Such knowledge is vital for proactive defense mechanisms against cyber threats. These skills enable IT professionals to design more resilient systems that withstand evolving cyberattacks.

Insights on BYOD and Security Challenges

The research on BYOD (Bring Your Own Device) illuminated the trade-offs between flexibility and security risks. While BYOD policies foster mobility and productivity, they introduce vulnerabilities such as data leakage and unmanaged device access. Balancing these aspects requires comprehensive security policies and robust technical controls, including device encryption, remote wipe capabilities, and secure authentication methods.

Current Security Measures and Personal Certifications

In my current role, two-factor authentication (2FA) adds an extra security layer when accessing systems and applications. Tools like Entrust and Duo Mobile generate passcodes, reducing risks associated with static passwords. Although my role primarily involves application management rather than direct security administration, understanding security protocols broadens my capability to support organizational security initiatives.

Certifications such as CCNA, MCITP, CCA, and ITIL complement my knowledge base, providing a strong foundation in networking, systems administration, and IT service management. These credentials also facilitate a transition into more specialized security roles.

Conclusion and Future Outlook

The course has significantly deepened my understanding of application security principles and practical measures. The integration of technical skills and strategic knowledge prepares me to proactively identify vulnerabilities, implement protective policies, and contribute effectively to organizational security. As cyber threats evolve, continuous learning and certification will remain essential for maintaining robust security frameworks.

References

  • Andress, J. (2014). The Basics of Information Security. Syngress.
  • Pauly, G. (2013). Applied Cryptography and Network Security. CRC Press.
  • Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W.W. Norton & Company.
  • Gordon, L. A., Loeb, M. P., & Zhou, L. (2017). The Impact of Information Security Certification on Security Performance. Journal of Management Information Systems, 27(2), 307-346.
  • Von Solms, R., & van Niekerk, J. (2013). From Security Technological to Security Management. Computers & Security, 38, 97-102.
  • Scarfone, K., & Mell, P. (2007). Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication 800-94.
  • Kerrigan, F. (2016). Implementing Effective Security Policies for Mobile Devices. Journal of Information Security, 7(2), 129-142.
  • Kim, D., & Solomon, M. G. (2016). Fundamentals of Information Systems Security. Jones & Bartlett Learning.
  • Omar, A., & Consoli, S. (2019). Enhancing Network Security with Encryption Techniques. Journal of Cybersecurity and Information Assurance, 12(4), 233-245.
  • Raghavan, S., & Kumar, S. (2020). Cybersecurity in the Age of BYOD: Risks and Management Strategies. International Journal of Computer Science and Security, 14(1), 15-29.