Caroline Butler November 30, 2023 Introduction Cybersecurity-related technical systems play a huge social role in today’s world. Cybersecurity-related technical systems are utilized to ensure a person’s private data is protected, an organization’s data is protected, and are utilized by objects that we encounter everyday. Without cybersecurity-related technical systems, our personal information would be stolen and…
Career Paper
Caroline Butler Career Paper CYSE 201S Cybersecurity Forensic Analyst There are various cybersecurity careers that an individual can choose from. A cybersecurity career that I am going to be discussing is a Cybersecurity Forensic Analyst. Cybersecurity Forensic Analyst Job Description A cybersecurity forensic analyst is a job title that entails an individual that analyzes digital…
The Short Arm of Predictive Knowledge
Discussion Board Question: From this week’s Jonas Reading: How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge? I believe it is essential to constantly modify the development of cyber policies and infrastructure using the Short Arm of Predictive Knowledge. There is no way to determine the future…
The NIST Cybersecurity Framework
Discussion Board Question: From your readings of pages 1 – 21 of the NIST Cybersecurity Framework, what benefit can organizations gain from using this framework, and how would you use it at your future workplace? A benefit organizations can gain from using the NIST Cybersecurity Framework is the ability to effectively and efficiently solve a problem…
The Human Factor in Cybersecurity
Caroline Butler November 7, 2023 How would I balance the tradeoff of training and additional cybersecurity technology? As the Chief Information Security Officer, I believe that our limited funds should go towards additional training policies that can help our employees. Enacting additional training policies can help ensure that our employees have the necessary skills to…
SCADA Systems
Caroline Butler October 26, 2023 What are the vulnerabilities associated with critical infrastructure systems? There are numerous vulnerabilities associated with critical infrastructure systems. However, all of the vulnerabilities that are associated with critical infrastructure systems are classified into three categories. The three categories that these vulnerabilities are sorted into consist of Natural, Human-Caused, and Accidental…
Article Review #2
Caroline Butler CYSE 201S I reviewed an article from the International Journal of Cybersecurity Intelligence & Cybercrime titled “Cyberbullying: Its Social and Psychological Harms Among Schoolers”. The topic of the article, “Cyberbullying: Its Social and Psychological Harms Among Schoolers”, relates to three principles of Social Sciences. The three principles are Ethical Neutrality, Determinism, and Objectivity….
Article Review #1
Caroline Butler CYSE 201S I reviewed an article from The Journal of Cybersecurity titled “Digital fingerprinting for identifying malicious collusive groups on Twitter”. This article relates to the social science principles through conducting a social media analysis via Twitter, how hackers are using Twitter to spread hostile information, as well as maintaining honesty and decorum…
The CIA Triad
Caroline Butler September 12, 2023 What is the CIA Triad? The CIA Triad is a Cybersecurity model consisting of three components. The three components are Confidentiality, Integrity, and Availability. The first component of the CIA Triad is called Confidentiality. Confidentiality is a principle that utilizes protective measures that are guaranteed to protect an individual’s private…