Home


About Me

My name is Michael Obeng, I am 18 years age. I am originally from Fairfax Virginia but I moved to Woodbridge when I was 16 years old. I am 1 of 3 brothers. I currently enrolled at old dominion university majoring is cybersecurity.

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework can assist organizations in systematically managing and fortifying their cybersecurity posture. Using this paradigm can provide organizations with a number of significant benefits. It does this by first offering a common language and best practices that promote effective coordination and communication amongst many departments and stakeholders. Second, it helps businesses identify and rank cybersecurity threats, which allows for more targeted resource allocation and risk reduction programs. Moreover, the framework encourages continuous improvement because of its expandable and adjustable features, which allow it to adjust to changing technical developments and changes in the threat landscape. At my future workplace, I would integrate the NIST Cybersecurity Framework into our present cybersecurity management protocols. 

Protecting Availability

It is my duty as the Chief Information Security Officer (CISO) of a publicly traded company to preserve stakeholder confidence and guarantee business continuity by ensuring the availability of our systems. To achieve this, I would implement a comprehensive plan to protect our systems against disruptions and outages. In order to mitigate the consequences of network outages or hardware malfunctions, this would need implementing a robust network architecture with failover and redundancy features. Moreover, implementing distributed denial-of-service (DDoS) mitigation techniques would defend against malicious attacks intended to overwhelm our systems and disrupt operations.Regular backups and data replication to geographically scattered locations will further enhance resilience by ensuring prompt recovery in the case of data loss or system failures. Frequent testing and comprehensive incident response techniques would also enable us to quickly detect and mitigate hazards, hence reducing the impact on system availability. We can safeguard our systems’ availability, ensure uninterrupted operations, and maintain stakeholder trust by implementing these preventative measures.

 Ethical Considerations of CRISPR Gene Editing

Because biological data and technologies might be misused or breached, ethical considerations are crucial in the field of biocybersecurity. Data security and privacy constitute a major ethical concern. As biotechnology progresses, it becomes necessary to protect the privacy and security of enormous amounts of sensitive biological data that are collected and analyzed. Individuals’ genetic or biological information may be accessed, exploited, or misused if strong security measures are not in place. The protection of people’s right to privacy must come first in ethical principles, but they must also provide room for essential research and innovation in the field of biocybersecurity.In addition, there is an urgent ethical need to address biotechnologies’ dual-use nature. These technologies have the potential to be used for evil purposes like bioterrorism or biowarfare, even if they also have the potential to advance healthcare, agriculture, and environmental sustainability. Ethical frameworks have to strike a careful balance between encouraging positive biotechnology breakthroughs and reducing the hazards of misuse. To avoid their use for negative ends, this entails promoting openness, responsibility, and responsible stewardship of biological resources and technologies. We may work to maximize the advantages of biotechnology while preventing potential exploitation and guaranteeing the welfare of people and communities by incorporating ethical considerations into BioCybersecurity activities.

week 1 journal

Various responsibilities supporting the cybersecurity area are outlined in the NICE Workforce Framework for Cybersecurity. These roles are categorized into “Protect and Defend,” “Analyze,” and “Operate and Maintain.” The “Protect and Defend” category, which includes duties like threat analysis, incident response, and security operations, is the one I would most like to concentrate on. I like solving problems and the challenge of protecting against changing cyberthreats, therefore this appeals to me. On the other hand, I’m least interested in the “Governance, Risk, and Compliance” category. Despite its importance, it tends to focus more on administrative and regulatory tasks, which is less in line with my interests in solving technical problems and addressing immediate cybersecurity issues.

week 2

In cybersecurity, scientific concepts are crucial because they guarantee thorough, evidence-based methods. Empiricism places a strong emphasis on using data and empirical evidence to inform security protocol and threat response decisions. Because determinism guarantees predictable system behavior, cyberattacks are easier to foresee and stop. Vulnerabilities are decreased by parsimony, which encourages simple solutions free of superfluous complexity. Objectivity guarantees objective evaluation of risks and weaknesses, resulting in more dependable defenses. Reproducibility ensures robustness by enabling consistent testing and validation of security procedures across many contexts. When combined, these ideas aid in the development of cybersecurity tactics that are more dependable, efficient, and successful.

week 3

esearchers can examine trends, find commonalities, and evaluate the effects of data breaches in various businesses by using publicly available data on breaches from PrivacyRights.org. They can find trends in how breaches happen and the efficacy of current security measures by looking at the different kinds of breaches, the amount of people impacted, and the techniques used to compromise data. In addition to providing insights into the effects breaches have on customers, this data can assist in assessing the legal, financial, and reputational repercussions for businesses. Researchers can also utilize this data to assist shape future policy by promoting stricter data security laws and privacy protections.

week 4

The five stages of Maslow’s Hierarchy of Needs are self-actualization, esteem, safety, love/belonging, and physiological. In each of these fields, technology is essential. For instance, online food shopping facilitates convenient access to necessary services, which helps to meet physiological needs. Security measures in apps that safeguard personal information improve safety, especially when utilizing online banking. By enabling me to keep up relationships with friends and family, social media platforms promote affection and a sense of belonging. I gain more respect and recognition in my professional network when I share my accomplishments on sites like LinkedIn. Last but not least, I can achieve my potential and reach self-actualization by pursuing my interests and lifelong learning through online courses and educational resources. My digital encounters are entwined with each degree of need, demonstrating the important role that technology plays in my life.

week 5

o properly rate the motives, I’ll take impact, relevancy, and clarity into account.

Motive A: Clearly explains behaviors and is well-supported by facts.
Motive B: Supported by research and pertinent to contemporary societal developments.
Motive C: Offers illuminating background information, with a moderate amount of instances to back it up.
Motive D: Needs more evidence; has some logical flaws but is generally understandable.
Motive E: An intriguing idea that is based on anecdotes and lacks empirical backing.
Motive F: Less convincing; weak ties to the primary subject.
Motive G: Insufficiently specific and poorly expressed; has little application.
Each motive’s clarity and application are reflected in its ranking; higher rankings denote better fundamental backing and more obvious topical relevance.

week 6

Three fraudulent and three authentic websites are contrasted below, with an emphasis on their unique characteristics:

 Website Fraud: www.fakebank.com

 Design: Unprofessional appearance and poor layout.
 Contact Information: No customer service or clear contact information is provided.
 URL: www.scamcharity.org; not secure (http instead of https).

 Appeals: Makes ambiguous statements about assisting people and uses emotive language.
 Transparency: Operations and financial data are unclear.
 Accreditation: No external certifications or validations.
 PhisherRetailer.com

 Pricing: Provides goods at exorbitantly low costs.
 Customer service: Few or no ways to get in touch with customer service.
 Location: No explicit return policy or physical address.
 Real Websites

RealBank.com

Design: A polished and intuitive user interface.
Contact Details: Options for customer assistance that are easy to find and use.
URL: Secure (https), signifying a transaction-safe website.
Verified Charity, Inc.

Transparency: Comprehensive details regarding the organization’s goals, initiatives, and finances.
Accreditation: Shows the emblems of accredited accrediting bodies.
Testimonials and reviews from reliable sources are signs of trust.
Retailer.com

Pricing: In line with market norms, prices are competitive but fair.
Customer service: Easy-to-find contact details and prompt assistance alternatives.
Location: Offers a detailed return policy along with a real location.
In brief
Real websites put security, transparency, and user trust first through expert design and clear communication, while fake websites frequently utilize emotional manipulation, lack openness, and have amateurish designs.

week 10

The author of the article on social cybersecurity highlights how crucial it is becoming to safeguard not just technical systems but also people.  It talks about how people are the weakest link in security procedures because social engineering attacks take advantage of human nature.  The article emphasizes how important it is for businesses to put in place thorough training programs that educate staff members about social engineering techniques and promote proactive conduct.  Organizations can strengthen their defenses against threats that take advantage of human weaknesses by cultivating a culture of cybersecurity mindfulness.  In order to improve overall resistance against attacks, the paper presents a strong case for incorporating social cybersecurity into more comprehensive cybersecurity tactics.

week 11

A number of social themes that emphasize the relationship between technology and human behavior come to light in the video about the cybersecurity analyst position.  The significance of teamwork and communication in effectively addressing cyberthreats is one recurring issue.  Analysts have to collaborate closely with others, exchanging ideas and tactics, which emphasizes how important collaboration is to creating a safe atmosphere.  The lecture also discusses the necessity of fostering a culture of alertness in which staff members at all levels are motivated to take preventative measures in the area of cybersecurity.People need to understand their role in ensuring security, which reflects broader social behaviors linked to knowledge and accountability.  Lastly, the focus on continuous learning and threat adaption highlights how social behaviors are dynamic in response to a constantly changing digital environment.  All things considered, a cybersecurity analyst’s work involves more than simply technical knowledge; it also calls for an awareness of social dynamics and the human elements that affect security procedures.

career paper

articles