Reflection on Lessons Learnt from the Course

Reflection on Lessons Learnt from the Course

 

Discuss one of the most important things you will take from this course. You do not have to document your sources for this question. It is an opinion question.

Discuss one of the most important things you will take from this course. You do not have to document your sources for this question. It is an opinion question. Below are the topics of the course . draft a 2 pages APA format word document to summarize things you have learnt from the below topics in whole course duration.

Introduction and Security Trends,General Security Concepts, Operational and Organizational Security,The Role of People in Security, Cryptography,Public Key Infrastructure,PKI Standards and Protocols, Physical Security, Network Fundamentals

Infrastructure Security, Authentication and Remote Access, Wireless Security and Mobile Devices, Intrusion Detection Systems and Network Security, ,System Hardening and Baselines, Types of Attacks and Malicious Software,E-Mail and Instant Messaging, Web Components, Secure Software Development, Business Continuity and Disaster Recovery, and Organizational Policies,Risk Management, Change Management, Incident Response, Legal Issues and Ethics.

Answer preview

From the entire course, I have learned the need for data security with the increasing trends in digital and cloud operations. Under the topic of operational and organizational security, it is clear that organizations need protection on operational and information management. Regarding operational security, one has discovered the essence of managers to determine the adversaries involved and the need to execute critical measures that eliminate adversaries. This execution of essential criteria implies that operational and organizational security act as risk management strategies. The implementation empowers managers to view operations with possibilities of risks thus ought to work to prevent the risks. One has also discovered that an organization performs best when information is protected from unauthorized access.

Regarding the roles…

(600 words)
Scroll to Top