Chat with us, powered by LiveChat Practical Connection Assignment | Coms Paper
+1(978)310-4246 credencewriters@gmail.com
  

Assignment: Provide a reflection of at least 500 words
(or 2 pages double spaced) of how the knowledge, skills, or theories of
this course have been applied, or could be applied, in a practical
manner to your current work environment. If you are not currently
working, share times when you have or could observe these theories and
knowledge could be applied to an employment opportunity in your field of
study. Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. If you
are not employed, demonstrate a connection to your desired work
environment. You should NOT, provide an overview of the assignments assigned
in the course. The assignment asks that you reflect how the knowledge
and skills obtained through meeting course objectives were applied or
could be applied in the workplace. Course SyllabusCourse Name : Application SecurityThe following series of tables provide sources of supplementary information to augment your learning in digital forensics. You may consult as many resources as you wish. Web References: Links to web references in this document and related materials are subject to change without prior notice. These links were last verified on September 25, 2019. Books Title Author(s) Year ISBN Getting Started with Windows Server Security Santhosh Sivarajan 2015 978-1784398729 Group Policy: Fundamentals, Security, and the Managed Desktop Jeremy Moskowitz 2015 978-1119035589 Mastering Windows Server 2016 Svidergol, et al. 2018 978-1119404972 Windows 10 for Enterprise Administrators: Modern Administrators’ guide based on Redstone 3 version Stokes, Singer, and Diver 2017 978-1786462824 Windows Security Monitoring: Scenarios and Patterns Andrei Miroshnikov 2018 978-1119390640 Certification Bodies and Certifications Organization/Certification(s) URL CompTIA A+, Network+, Security+, more https://www.comptia.org/certifications (ISC)2 SSCP, CISSP, more https://www.isc2.org/ Microsoft MCSA: Windows Server, MCSE: Productivity, Microsoft 365 Certified: Security Administrator Associate, more https://www.microsoft.com/en-us/learning/certifica… Journals/Magazines Title URL Admin Magazine http://www.admin-magazine.com/tags/view/Windows Windows Certified Professional Magazine https://mcpmag.com/Home.aspx Windows IT Pro https://www.itprotoday.com/ Other References Organization URL Microsoft Security https://www.microsoft.com/security/blog/ SANS Internet Storm Center http://isc.sans.edu/index.html Security Intelligence https://securityintelligence.com Windows Community https://community.windows.com/en-us/ Information Search Use the following keywords to search for additional online resources that may be used for supporting your work on the course assignments: Access controlActive DirectoryBackupBaselineEncryptionGroup PolicyGroup Policy ObjectIncident handlingMalwareMicrosoft Windows administrationMicrosoft Windows applicationsMicrosoft Windows securityProfileRestoreSoftware Development Security Life Cycle (SDLC)ThreatsVulnerabilitiesVulnerability scanningPractical Connection
Assignment
A walkthrough
Start with an APA Template
Select APA Style Report
th
(6 edition is acceptable)
Click Create
Close Researcher region
Save as…
Remove unnecessary elements
Remove things like:
• Author Notes
• Abstract
• Footnotes
• Tables
• Figures
• Footnotes
• References if not needed (Such as in a personal connection
assignment)
Remove Unused References
Update Title Page
Structure outline
Identify topics to include
• Every paper should have
introduction (no header)
• Body
• Conclusion
Possible topics come from the
text.
Examples are:
CIA Triad, Threats, Vulnerabilities,
Active Directory, Security Groups,
Least Privilege, Encryption,
Malware, Administration, etc.
Rough outline
Write the body of the paper
Write the Conclusion
Write the Introduction
Running head: PRACTICAL CONNECTION
Practical Connection
Proffessor
University of the Cumberlands
1
PRACTICAL CONNECTION
2
Practical Connection
As an analytics architect at a Microsoft technology integration partner, many of the
concepts in Application Security can be applied to my daily work. While many topics are
relevant, I will explore three. I will explore the principle of least privilege, Active Directory
Groups, and the importance of audits. Lastly, I will present the conclusion.
Principle of Least Privilege
As discussed in this course, the idea of least privilege is that a group or individual should
only do things that their role within the organization requires them to do. As an analytics
architect, this concept is very relevant. Many organizations require that individuals can only see
data that they have a business purpose to see. When designing data-oriented solutions, I often
have to balance performance and other design constraints with competing concerns. This
tradeoff means that I often must use the priority of requirements to determine which
requirements should be met. Ensuring that individuals only see what they should is often a very
high priority.
Active Directory Groups
In this course, we also discussed the importance of Active Directory Groups. This is also
relevant to my work as an analytics architect in that we often need a way to determine who can
access what information or perform a given operation. As the organizations I typically work with
use Microsoft technologies, they often utilize Active Directory. Understanding of Active
Directory groups is critical to the success of many of my projects.
Importance of Audits and Logging
This course also covered the importance of audits and access logs. Audits are also
important in the design of analytics solutions. Often it is important to know what person is
PRACTICAL CONNECTION
3
accessing what data. Also, many of the organizations are governed by regulations which require
tracking all changes to data or process in an exhaustive fashion. This means that when someone
views a record, that fact must be recorded. Recording the information is the first step in the
process. After the data related to data access is captured, it must be processed so that governance
reports can be created. Also, the original data must be preserved so that an external auditor can
reproduce the same results.
Conclusion
The importance of the concept of least privilege, Active Directory Groups, and auditing
was presented. These concepts have relationships. For example, the principle of least privilege
is often made possible through the use of Active Directory Groups. Likewise, auditing is often
applied based on an individual’s membership in a group. For example, it may be important to
record when someone in the data operations group accessed records in the payroll-related
databases.
While the topic of application security is very large, it does have specific application to
the data analytics space. As an analytics architect, I find many of the topics to be a refresher of
existing knowledge combined with learning new things. While I do not plan to become an expert
in security, understanding the concepts makes me a better analytics architect.

Purchase answer to see full
attachment

error: Content is protected !!