Provide a reflection paper of 500 words minimum (2 pages double spaced) of how the knowledge, skills, or theories of Application Security have been applied


Provide a reflection paper of 500 words minimum (2 pages double spaced) of how the knowledge, skills, or theories of Application Security have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Choose : not working currently option 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Choose from the all  listed topics and make the assignment and you can choose some more topics related to the subject :- Application Security

Topics are as listed below:

· How information security applies to Windows OS. 

· Security features of Windows OS.

· build Implement secure access controls in Windows.

· setup encryption to secure a Windows environment.

· Install controls to protect Windows from malware.

· build Group Policy controls in Active Directory in Windows.

· use the profile and audit tools that keep Windows systems secure.

· review backup and restore operations on a given Windows system.

· design techniques to protect Windows networks from security vulnerabilities.

· develop a security administration framework to ensure security policy goals.

· decide which security controls are the most effective for computers & networks.

· design techniques to protect Windows apps from security vulnerabilities.