Myself Sai Shanthan, I’m currently pursuing master’s degree in Information systems security. I have 5 years of experience working in various areas in the IT sector. Currently I’m working as a Guidewire Developer at an Insurance Company located in Dallas, TX. Using the concepts learned from this course and the knowledge gained has been incorporated into my project for better results in securing the application.
From this course I have gained knowledge on Access Control at various levels likely from organizational infrastructure security to securing software applications by limiting the access to data information.
My work involves working in windows platforms with Guidewire tool an Insurance suite for the agents to generate an insurance policy based on customer preferences. The Resultant Set of Policy (RSOP) for the external associates working in the project restricting the users having required privileges in different areas of work without effecting the daily work activities. Based on our organization architecture, to call an operation a handshake needs to happen between different integration layers.
To secure that handshake interaction I have learned and implemented the encryption keys which will have encrypted key password of the destination layer should be incorporated in the source layer for the secure connection to establish. Encrypt the password key by specific encryption algorithm. We maintain a individual security group in each layer and work on the functionality of nesting.
Based on the concepts learned, I have provided a proof of concept which involves several aspects likely, on Group policy configuring more security features in the windows workstation provided by the organization.
I’ve learned and enhanced the existing system of file permissions from area project based to employee role based in the organization. Server based backups on scheduled basis where the configuration, metadata and resource files on the server based virtual machines are backed up and stored to a location on the network drive. In the event of any change to the machines the data can be restored after essential tests are done on the backup files if it the restore operation would result in performance issues on the drives. The machines in the project are mostly virtual based and utilize VMware product. Build test case plan to test the efficient functioning of the recovery procedures and the improve the plan based on the findings resulted. Implement a password change policy for every month on the local workstation and every 3 months periodically on the virtual machines would result in a better password policy. Change privileges on certain programs and restricting certain installation of programs and services on the category basis would protect the workstation from the vulnerabilities of a disaster.
We follow SAFE Agile methodology of development cycle. The aspect which I learned in from this course and I have been implementing is for every code change irrespective of the quantity of the functionality change there should be a test case scenario in every aspect of the effect caused. Which helps in reaching the specification at most high standard and quality results in a better quality of code. We have been adopting a process of continuous software development and deployment using DevOps. Working in such an environment improvement in securing the code should be ideally more than the regular basis of application testing because security should also be continuous in such an environment. With the concepts learned I will be involving more in the aspect of managing the software supply chain and checking the ensuring the security of the common components and frameworks like automated testing which triggers, an incident and the incident management flow should be part of taking care of that which eventually be documented based on the cause either be it hardware or software. There should be an implementation automated scan for vulnerabilities, likely static scans and dynamic scans in the work development environment.
Significant parts of the course had been executed in my flow venture which I have not recognized in my job This brought about me distinguishing in what territories can I myself fuse these prescribed procedures. Along these lines, the security and nature of work can be improved giving an ideal outcome. however, this course gave an angle to investigate on the Access Control methods in various work regions outside of mine and furthermore I have increased Informative down to earth learning.
Remember! This is just a sample.
You can get a custom paper by one of our expert writers.
Get your custom essay
Helping students since 2015
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download