My name is George! Welcome to my cybersecurity E-portfolio. Here will be several of my writings relating to the topic of cyber security
Discussion Board #1 – Introductions
My name is George. I am from New Jersey. I am a junior in college. I am also a Cyber security major that is still trying to figure out what subset or concentration I would like to focus on. For my hobbies I like to hang out with my friends and go to the gym.
Discussion Board # 2 – Framework
NSIT Cyber Security framework is a set of guidelines for mitigating organizational Cybersecurity risk. This provides a common language and a collection of standards. Cybersecurity framework is very essential. The purpose of framework is to reduce an organizations exposure to weakness and exploits that hackers and other criminals may leverage. This prioritizes implementation of security controls. It is also important for developing Cybersecurity infrastructure. The 5 core activities of NIST Cybersecurity framework are identify, protect, detect, respond, recover. Identifying is important in order to control security risk and manipulate it based of assets, data and capabilities. Doing so limits and help to identify several weak spots. The ability to identify several different flaws or potential problems is a competent preventive measure to stay protected from cyber threats. protecting is important because companies must develop proper safeguards to control the cyber network breaches. Protection also can establishes layers of defense which can keep an organizations digital network protected from cyber threats. Detection is important so an organization can deem a cyber threat as soon as possible. Without detection an issue can become prolonged, and could potentially cause severe damage if not attended. When it comes to responding, companies must develop a proper response plan to cyber threats. Having a proper response plan ensures an efficient and swift reaction once a cyber threat presents its self. In the context of recovery companions should be adaptable and resilient in order to restore and services damaged by cyber attacks. Having a functional system in case a recovery is foreseen will limit liability.
Discussion Board #3 – Information Systems Security
1. Briefly define each of the three members of the information security triad
Confidentiality ensures that sensitive information is only accessible to authorized individuals. Integrity protects against unauthorized modification of data and ensures that information remains accurate and consistent. Availability ensures that authorized users have access to the information they need, when they need it.
2.What does the term authentication mean?
Authentication is the process of verifying the identity of a user, device, or system to ensure that only authorized entities can access protected information or systems.
3.What is multi-factor authentication?
Multi-factor authentication is a security process that requires the user to provide two or more forms of identification before accessing a protected resource or system.
4. What is role-based access control?
Role-Based Access Control is a method of regulating access to resources in a computer system based on the roles of individual users within an organization.
5.What is the purpose of encryption, and fundamentally how does it work?
Encryption is the process of converting plain text into a coded representation, known as ciphertext, in order to protect sensitive information from unauthorized access. The purpose of encryption is to ensure the confidentiality and privacy of information being transmitted or stored.
6.What is pretexting and how does it represent a threat in the Cybersecurity landscape?
Pretexting is a form of social engineering in which an attacker creates a false identity or situation in order to trick a victim into revealing sensitive information or accessing protected systems.
7.What’s the point in backups & what are the components of a good backup plan?
The point of backups is to ensure that critical data can be restored in the event of an unexpected loss, allowing organizations to minimize downtime and protect against the loss of important information.
8.What is a firewall?
A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
9.Discuss various types of Firewalls.
Network firewalls inspect and control incoming and outgoing network traffic at the network layer of the OSI model. Virtual firewalls are software-based and can be easily deployed within virtualized environments, such as virtual machines or containers. Lastly, cloud firewalls are designed to protect cloud-based resources and can be implemented as part of a cloud service provider’s infrastructure or as a separate security solution.
10.What does the term physical security mean and how does it apply to Cybersecurity?
Physical security refers to the protection of tangible assets, facilities, and data centers against unauthorized access, theft, damage, or destruction. Physical security applies to cybersecurity because it helps to prevent unauthorized access to sensitive information stored on devices, such as computers and servers.
Discussion Board # 4 – Cyber Threats
he importance of cyber security in today’s technologically advanced world deserves strong emphasis. As technology and the internet play a significant role in personal and professional affairs, it’s vital to recognize the various dangers present and implement steps to safeguard oneself. Phishing is a specific type of cyber attack in which an attacker uses fraudulent means to acquire confidential data, such as passwords and credit card details to acquire confidential data, such as passwords and credit card details. Phishing is becoming a more potent and convincing threat affecting individuals and organizations. or other personal data from an individual or organization. Phishing attacks are usually carried out via email, phone, or fake websites that mimic a legitimate source to trick the victim into providing their information. For instance, a hacker could send an email disguised as a bank or e-commerce site, requesting the recipient to verify their account information. This email may include a link to a bogus website, where the target is prompted to provide login details or other confidential information. The stolen information can be utilized for identity theft, financial scams, or accessing personal data like intellectual property or business secrets. A successful phishing attack can have serious consequences. For businesses, phishing attacks can lead to substantial monetary losses and damage their reputation. Moreover, phishing is a rapidly growing concern with severe implications for individuals and organizations. To defend against phishing attempts, it is crucial to remain cautious and alert and to take steps to secure sensitive information. By staying knowledgeable and employing effective protection methods, we can lower the likelihood of being targeted by phishing scams.
Work Cited:
Cybersecurity Ventures. (2021). Cybersecurity market report 2021-2031. Retrieved from https://cybersecurityventures.com/cybersecurity-market-report-2021-2031/
Federal Bureau of Investigation (FBI). (2021). Common Fraud Schemes. Retrieved from https://www.fbi.gov/scams-and-safety/common-fraud-schemes
National Cyber Security Centre (NCSC). (2020). Phishing. Retrieved from https://www.ncsc.gov.uk/guidance/phishing
Discussion Board #5 – Risk Management
Industrial Cybersecurity encompasses safeguarding industrial control systems and operational technology networks, which are utilized to monitor and manage critical infrastructure and industrial operations. These systems are widely used across several industries, including energy, water, transportation, and manufacturing. This is crucial in ensuring that industrial processes run effectively and safely. The objective of industrial cybersecurity is to ward off cyber attacks that could compromise the safety and functionality of these systems and secure sensitive data stored on these networks. A security breach in an industrial control system can have significant consequences for a company. The initial effect would be the deprivation of private data such as trade secrets, financial data, and customer information. This could cause operational disruptions, causing downtime, reducing work capacity, and negatively impact customer expectations. In some severe cases, a security breach could even cause substantial harm to equipment or facilities, putting public safety at risk. Moreover, a security breach could cause financial losses as the company may have to endure the cost of repairs, compensation for damages, and legal fees.
In conclusion, industrial cybersecurity is an extensive concern for organizations that rely on industrial control systems and operational technology networks. A security aperture in these systems could lead to deliberate repercussions, including loss of confidential information, practical interference, physical damage, and commercial diminishes. Although many organizations may not be fully equipped to face this type of threat, taking the initiative to secure industrial control systems and operational technology networks can help mitigate the liability of a security breach and mitigate its potential impacts.
“The State of Industrial Cybersecurity 2017“
Discussion Board #6 – CyberSecurity Impact on Small Business
The development of a cybersecurity program is critical for any organization, regardless of size, but small businesses often face the challenge of limited financial resources. As a result, small businesses must be prudent in determining where and how to spend their limited resources. Here are some steps that small businesses can take to determine where to begin. First, conducting a risk assessment will allow small businesses to identify potential vulnerabilities and threats to their systems. This information can help prioritize cybersecurity measures and determine which controls are necessary to mitigate these risks. Next, educating employees on cybersecurity best practices is crucial to reduce the risk of accidental data breaches. This may include training employees to use strong passwords, avoid suspicious emails, and report any security incidents. Lastly, small businesses should identify the assets and data that are most critical to the business, such as customer information, financial data, and intellectual property. This prioritization can help ensure that cybersecurity efforts are focused on the areas of the business that need it most. However, investing in a cybersecurity program requires significant resources. Small businesses will need to allocate funds for cybersecurity tools and software to protect their data and systems. Additionally, developing a cybersecurity program takes time and effort, so small businesses may need to add resources to ensure the program’s success. Moreover, employee training may also require investment to ensure that all employees understand and follow cybersecurity policies and procedures. In conclusion, small businesses must develop a cybersecurity program to protect against cyber threats. Conducting a risk assessment, employee education, and asset identification are critical starting points. While investments in cybersecurity tools, employee training, and program development require sacrifices, the benefits of protecting against data breaches, legal compliance, and improved reputation far outweigh the costs.
Discussion Board #7 – Identity Management
Two key trends are Biometric Authentication and Identity as a Service. Biometric authentication is an emerging trend in Identity Management that is swiftly gaining traction. This approach entails leveraging unique physical traits such as fingerprints, facial recognition, or iris scans to verify an individual’s identity. By utilizing biometric data, this type of authentication can provide a higher level of security compared to traditional methods like passwords. Compared to conventional authentication methods such as passwords, biometric authentication offers a superior level of security because biometric data is exclusive to each person, making it difficult to replicate or fake. Identity as a Service is another developing trend in Identity Management that involves the cloud-based distribution of identity and access management services. IDaaS vendors deliver a variety of services, including user authentication, single sign-on, and identity governance and administration. IDaaS has gained popularity among companies of all sizes because it provides an affordable approach to managing identities and access to resources. Small and medium-sized businesses are particularly inclined to adopt IDaaS since they may lack the resources to develop and uphold their own Identity Management systems.
FIDO Alliance, also known as Fast Identity Online Alliance, is a collaborative organization that endeavors to set open standards for secure authentication. The group was formed in 2012 by a partnership of leading corporations, including Google, Microsoft, PayPal, and several others. FIDO aims to address the issue of weak passwords and their related security threats. Traditional passwords are susceptible to various forms of attacks such as phishing, brute force, and password reuse, which can lead to unauthorized access to user accounts and the pilfering of sensitive data.
Discussion Board 8 – Cryptography
The study of cryptography entails methods that aim to secure communication and data storage. One of its primary objectives is to guarantee the authenticity and integrity of data. Authenticity refers to the capacity to authenticate the identity of the sender of a message or data, while integrity pertains to ensuring that the data remains unchanged and uncorrupted during storage or transmission. Cryptography offers various techniques that can be utilized to accomplish these objectives. Digital signatures are a commonly used method for ensuring the authenticity and integrity of digital messages or documents. This technique utilizes a mathematical scheme that involves a public key infrastructure (PKI) and a hashing algorithm. To create a digital signature, the sender generates a hash value of the message or document using a hashing algorithm and encrypts it with their private key. The recipient can then use the sender’s public key to decrypt the digital signature and compare the resulting hash value to the original hash value to verify the authenticity and integrity of the message. Encryption is an alternative method to guarantee authenticity and integrity. It employs an algorithm to transform plain text data into cipher text that cannot be read without the decryption key. Encryption is useful in safeguarding data during storage or transmission. Unauthorized parties cannot access or modify encrypted data, preserving its integrity and preventing unauthorized access. To conclude, cryptography offers various methods for maintaining the authenticity and integrity of data. Secure communication channels, for instance, are encrypted channels that provide a safe platform for transmitting data between two parties. This technique ensures that data cannot be tampered with or intercepted during transmission, guaranteeing the authenticity and integrity of the data. Digital signatures, encryption, and secure communication channels are among the many techniques available for securing data. Employing these techniques enables individuals and organizations to safeguard their data, preventing unauthorized access or tampering by malicious parties.
Discussion Board #9 – Engineering Systems Cybersecurity
There are several impacts cyber technology has on engineering systems. One impact would be Improved communication and collaboration. Cyber technology has facilitated better communication and cooperation between engineers, enabling them to work together more efficiently and effectively. Online collaboration tools allow engineers to work in real-time, regardless of location, enhancing teamwork and reducing the expenses and time associated with coordinating and communicating with teams in different places. Another impact is Increased safety and security. Engineering systems’ safety and security have also benefited from cyber technology. For instance, the automotive industry employs cyber technology to design sophisticated safety features, such as collision detection and lane departure warnings. Additionally, cyber technology monitors and secures critical infrastructure’s industrial control systems, including power plants and water treatment plants, ensuring safe operation. Cyber technology has also enhanced the maintenance and repair of engineering systems. Engineers can now use sensors and data analytics to monitor the performance of engineering systems in real time, detecting potential issues before they escalate into major problems. As a result, this has curbed maintenance and repair expenses and downtimes while enhancing the engineering systems’ reliability and durability. Design capabilities will also be enhanced. Thanks to cyber technology, engineers can now design and simulate complex systems with improved accuracy and precision. Engineers can use sophisticated software tools to create comprehensive 3D models of engineering systems, which they can test and optimize before constructing them. Consequently, this has reduced the time and expenses associated with physical prototyping while enhancing the quality and dependability of engineering systems. As the evolution of cyber technology persists, it will likely play an increasingly prominent part in determining the direction of engineering in the future.
Discussion Board #10 – SCADA
SCADA systems are crucial in managing and operating industrial control systems (ICS) across various infrastructure sectors, including transportation, power generation, and water treatment. They provide real-time data and control over industrial processes. However, the increasing reliance on SCADA systems has exposed them to cyber threats, which could cause significant harm to public safety and critical infrastructure. The outdated technology and lack of basic security features are among the primary vulnerabilities of SCADA systems. They were developed and implemented before the widespread use of the internet, making them susceptible to attacks that leverage the lack of encryption and authentication protocols. Furthermore, the proprietary software and hardware used in these systems make it challenging to update and patch them, exposing them to known vulnerabilities that attackers can exploit. Another weakness of SCADA systems is their dependence on human operators, who can fall prey to social engineering attacks. Social engineering tactics such as phishing emails can deceive operators into providing access credentials or downloading malware. The interconnectivity of SCADA systems with other methods, such as corporate networks and the internet, creates additional vulnerabilities which attackers can exploit. In 2015, cybercriminals gained access to a corporate network through a spear-phishing attack and used that access to breach a water treatment facility’s SCADA system. Once attackers gain access to SCADA systems, they can manipulate industrial processes, causing significant damage to critical infrastructure systems. Organizations must implement adequate security measures, including regular updates and patching, robust authentication protocols, and employee training on recognizing and preventing social engineering attacks from mitigating the risks associated with SCADA systems. Failure to secure SCADA systems could significantly damage critical infrastructure systems and public safety.
Discussion Board #11 – Criminal Justice and Cybercrime Overlap
The convergence of criminal justice and cybercrime has become increasingly crucial due to the proliferation of the digital landscape and the upsurge of illicit activities perpetrated online. Cybercrime refers to criminal acts committed using digital technology, such as hacking, identity theft, and fraudulent activities conducted on the Internet. In contrast, criminal justice encompasses the system by which society responds to criminal activities, including investigation, prosecution, and sentencing. Furthermore, laws have been enacted to penalize specific forms of cybercrime, while international agreements have been established to enable cross-border collaboration in the investigation and prosecution of cybercriminals. Another critical facet of the overlap between criminal justice and cybercrime is cybersecurity’s role in preventing and reducing illegal online activities. Cybersecurity comprises practices and technologies to safeguard digital systems, networks, and devices from unauthorized access, theft, or harm. Robust cybersecurity measures are vital to thwart cybercrime, as they can help detect and prevent malicious activities before they cause damage. The overlap between criminal justice and cybercrime is also closely linked to other disciplines discussed in this course, such as information security, risk management, and ethics. Information security is integral to cybersecurity and is essential in countering cybercrime. Similarly, risk management is crucial in identifying and managing vulnerabilities that cybercriminals can exploit. Finally, ethics are vital in criminal justice and cybersecurity since surveillance technologies and other tools for preventing and investigating cybercrime raise pertinent ethical concerns relating to privacy and individual liberties. In conclusion, the intersection of criminal justice and cybercrime is a multifaceted and ever-evolving domain that demands multidisciplinary approaches to tackle. Law enforcement agencies, cybersecurity experts, and other stakeholders must collaborate to develop effective strategies for thwarting, investigating, and prosecuting cybercrime while respecting ethical principles and safeguarding individual rights and freedoms.
Discussion Board #12 – Cyber Stalking/Cyber Harassment
The swift evolution of technology has had a profound impact on the manner in which people interact and communicate with each other. The emergence of social media, instant messaging, and video conferencing has rendered the definitions of appropriate and inappropriate behavior increasingly complex and nuanced. In this composition, I will deliberate on how advancements in technology have influenced these definitions. One notable impact of technology on behavior is the blurring of boundaries between public and private spaces. In the past, individuals had a clear comprehension of what constituted acceptable behavior in public spaces versus private spaces. However, with the advent of smartphones and social media, people can effortlessly capture and disseminate images and videos of others without their consent, thereby obscuring the lines between public and private spaces. This has led to the formulation of new guidelines on what is deemed appropriate behavior in public and private spaces. Another impact of technology on behavior is the creation of novel forms of harassment and bullying. Cyberbullying, for instance, has become a pervasive issue, whereby individuals use social media or other online platforms to intimidate and harass others. This type of behavior is frequently harder to detect and penalize, as it can transpire anonymously, and the victim may not be aware of the perpetrator. Moreover, technology has also created new opportunities for individuals to engage in inappropriate behavior, such as sexting, which is the act of transmitting sexually explicit messages or photographs to others. This behavior can be detrimental and result in legal consequences, particularly when the recipients are minors. Lastly, technology has also created new challenges in enforcing appropriate behavior. For instance, social media platforms such as Facebook and Twitter have faced criticism for their lack of accountability in regulating hate speech, fake news, and other forms of inappropriate behavior. In conclusion, technological changes have had a profound impact on the definitions of appropriate and inappropriate behavior. The blurring of boundaries between public and private spaces, the emergence of novel forms of harassment and bullying, the proliferation of opportunities for inappropriate behavior, and the challenges in enforcing appropriate behavior are a few instances of how technology has revolutionized the way people interact. As technology continues to progress, it is crucial to establish new regulations and guidelines to ensure that appropriate behavior is upheld, and individuals are held responsible for their actions.
Discussion Board #13 – Ethics
The progress of technology has brought numerous advantages to society, such as improved connectivity, increased access to information, enhanced healthcare, and increased efficiency in various sectors. However, along with these benefits, there are also ethical concerns that arise from the rapid growth of technology. Privacy is a significant ethical aspect of technology’s expansion. The widespread use of online platforms, smart devices, and data-driven services has raised concerns about personal data collection, storage, and sharing without explicit consent. Questions about data ownership, control, and transparency have become pressing ethical issues. Automation and job displacement are ethical concerns associated with technology’s growth. As automation and artificial intelligence (AI) advance, there are concerns about potential job loss and its impact on workers and communities. This raises ethical questions about the responsibility of businesses, governments, and society in ensuring equitable distribution of technology’s benefits and measures to address job displacement. Bias and discrimination are ethical concerns related to the development and use of technology. Unintentional biases can be embedded in algorithms and data used in machine learning and AI, leading to discriminatory outcomes in areas such as hiring, lending, and decision-making. Ensuring fairness, accountability, and transparency in technology development and deployment, and identifying and mitigating biases, are critical ethical considerations. Cybersecurity and data protection are important ethical aspects of technology’s growth. Increased reliance on technology has led to increased vulnerability to cyber threats, raising questions about the responsibility of individuals, organizations, and governments in safeguarding data and protecting critical infrastructure. Ethical concerns also arise regarding the use of hacking techniques for security purposes, which raises questions about the balance between security needs and privacy rights. Ethical AI and autonomous systems are further significant ethical considerations associated with the growth of technology. As AI becomes more sophisticated, questions about accountability, transparency, human oversight, and the ethical use of autonomous systems become pressing. For example, ethical dilemmas may arise in areas such as autonomous weapons, facial recognition technology, and decision-making in critical situations.