TS 8535 Week 10 Assignment System and Application Security Student Name Capella University TS-8535 Professor Name Submission Date System and Application Security Technological security has become a much-needed pillar of systems and applications for organizational resilience, and the increasingly fast-paced digital transformation is the time. The growth of cloud computing, mobile platforms, the Internet of Things (IoT) ecosystems, and software-defined infrastructures offers unprecedented opportunities. Still, at the same time, the attack surface is rapidly being widened (Malik et al., 2024). Research into the security of systems and applications has intensified due to cyber threats that are increasing in frequency, scale, and sophistication, resulting in new models for defense, automated methods for identifying vulnerabilities, and enhanced supply chain security. Recently, scholars made active efforts towards bridging theoretical foundations with practical solutions and, at the same time, unraveled some of the unresolved gaps challenging industry adoption. The following paper presents a critical review of the strengths and weaknesses in the latest research in order to help shed light on the maturity of the field, the effectiveness of proposed approaches, and further areas of deep enquiry for assurance that security innovations translate into sustainable protection in the real world. Analysis of Existing System and Application Security Mechanisms Modern defenses are integrated predictive, detective, and mitigating security controls throughout the software lifecycle. Secure-by-design and secure software development life cycle, or SDLC, practices such as threat modeling, dependency management and automated static application security testing (SAST) and dynamic application security testing (DAST) integrated into continuous integration/continuous deployment (CI/CD) at development time help minimize the root cause of vulnerabilities by catching the flaws early on and enforcing coding standards (Singh, 2025). Research showed that SAST/DAST/IAST layering is beneficial to enhance the coverage of the source, build, and runtime contexts, as well as best seen combined with developer education and pipeline gating (Oluwaferanmi & Liang, 2025). The controls are essential tools to ensure the protection of system and application security. Modern security of systems and applications is more and more based on layered defenses that are also runtime aware and can detect and mitigate the threat as it happens in complex software environments. Web application firewalls (WAFs) and runtime application self-protection (RASP) are adaptive reinforcements to malicious inputs or deviations from the control flow in real-time (Oluwaferanmi and Taofeek, 2025). Several peer-reviewed works have demonstrated the merit of using RASP in certain situations where the threat model of an application to be protected is particularly dynamic or situations where one needs to mitigate an attack immediately and in context-aware ways (Riera et al., 2022; Seth et al., 2023). For example, the approach has been practical to stop the injection or session hijacking attempts, and then note that the false positives and performance tradeoffs must be invariably managed (Hoxha et al., 2022). Memory safety controls and control flow protections are used to address a dominating class of attacks at the system level. The techniques of address space layout randomization (ASLR), data execution prevention (DEP/ NX), and control flow integrity (CFI) make it a lot more costly to perform a memory corruption attack and code reuse attack (Ayman and Zoghby, 2025; Canakci et al., 2020). Contemporary studies have brought to attention CFI variants being some of the compiler-assisted mitigations, generally working well but incomplete; complementary hardenings, and may require incremental deployment strategies in big codebases (Houy & Bartel, 2024). Collectively, the protections are making it extremely important in mitigating cybersecurity threats. Software supply-chain controls have become increasingly important. Software bill of materials (SBOM) practices, for example, have been combined with provenance tracking and automated scanning of third-party components (Nocera et al., 2025). The combinations provide a faster, evidence-based patching and risk triage experience. Systematic reviews for the years 2020-2025 have focused on SBOMs as helpful enablers for transparency and vulnerability management. However, the mechanism also acknowledges the barriers to adoption, such as tooling fragmentation and incomplete metadata (Stalnaker et al., 2024). Finally, there are architectural and organizational measures for bringing technical controls. Zero-Trust Architecture rethinks protection, and it is based on unceasing checks of identities and device posture, least privilege, and segmentation of access, reducing the need for perimeter defenses (Kang et al., 2023). Analogous operational mechanisms, endpoint detection and response, behavioral telemetry, automatic patch orchestration, and incident response playbooks are used to transform the point of detection to contain it quickly (Gundaboina, 2025). Recent peer-reviewed work gave an equal platform for integration and mature processes measured with metrics against any single technical control (Kang et al, 2023). In other words, there are several layers of effective system and application security. Build time prevention, Runtime enforcement, memory and platform hardening, supply chain transparency, and Zero Trust operations validated in the literature to be necessary but not sufficient. Emerging Research in System and Application Security Recent research in the fields of system and application security has given particular attention to the improvement of defenses against machine learning (ML) and the security of software supply chains, as well as hardening protections at the systems level. Machine learning techniques have found broad applications in cybersecurity applications like intrusion detection and malware classification (Gupta et al., 2022). Budiansyah et al. (2025) gave a broad survey that depicts the effectiveness of ML techniques in Anomaly detection, but still highlights the weakness to adversarial attacks. In the same line, Muthalagu et al. (2024) analyze evasion and poisoning attacks against ML classifiers and propose some robust adversarial training methods to mitigate such threats. Similarly, Deshmukh (2024) also reviewed the security evaluation of ML systems, which also emphasises the need for the usage of explainability and trustworthy AI as a necessary step towards countering adversarial manipulations. In particular, certified defenses with provable robustness guarantees were introduced by Ziras et al. (2025); the approach is a considerable step towards the deployment of secure ML models. The research provides support for robust measures for data protection and security. The SolarWinds and Log4j incidents have spurred research in the area of software supply chain integrity. O’Donoghue et al. (2025)
Need Help Writing an Essay?
Tell us about your assignment and we will find the best writer for your project
Write My Essay For MeThe post TS 8535 Week 10 Assignment System and Application Security appeared first on Ace My Course.
Make the most of your time with our professional essay writing service. We guarantee top-notch quality, on-time delivery, and complete confidentiality. Each paper is custom-made from scratch, tailored to your specific instructions, and 100% plagiarism-free. Count on us for exceptional academic writing.
Together, we can enhance your academic performance. Our team of skilled online assignment writers offers professional writing assistance to students at all academic levels. Whether you need a narrative essay, a five-paragraph essay, a persuasive essay, a descriptive essay, or an expository essay, we deliver high-quality papers at student-friendly prices.


