CYSE 201S
Here are some of the journal entry assignment’s I have done for CYSE 201S. Be sure to check out the other assignments!
Journal Entry #1 (Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.)
In the NICE Workforce Framework, there are a few careers that interest me such as Program Management(PM), Secure Project Management(SPM), and Communications Security. In particular, PM and SPM interest me because these seem like careers that deal closely with programs and files rather than with the more social aspect of cybersecurity like a career in Cybersecurity Policy and Planning. I’ve always been more drawn to the programming/reverse engineering and the management side of cybersecurity because it is much easier to complete a task or manage a resource rather than think how an attacker would attack or what kind of social impact an attack would have. However, I did also pick Communications Security because it seems like an interesting area that would require an equal amount of social engineering and raw programming/analysis ability.
Journal Entry #2(Explain how the principles of science relate to cybersecurity.)
The principles of science that most closely relate to cybersecurity would be Determinism, Empiricism, and Objectivity. The principle of Determinism most closely relate because the act on cybersecurity heavily relies on understanding that hacking methods typically exploit the Deterministic nature of the software and hardware that is wired into our computers, but they also are constricted to follow those same deterministic rules when creating their programs which leads to the ability to reverse analyze stuff like malware because it follows roughly similar behavior to other known malware. Empiricism relates to cybersecurity because most cybersecurity professionals depend on previously gained information and data to be able to prevent and predict most attacks which closely ties in with the principle of Empiricism because it basically means we can only study data based on what we have perceived. Finally, Cybersecurity closely relates to objectivity because in the field it is important to not let personal bias affect work especially when that work could lead to hundreds of compromised systems or data leaks.
Journal Entry #3(Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.)
Researchers might use the information on data breaches from privacyrights.org by studying the patterns that lead to the initial breaches to occur, and what breaches are most common or what do most data breaches demand after data has been stolen. They would also study which types organizations are most likely to be data breached. Researchers could use the information to study trends in typical cybersecurity vulnerabilities, find out hoe frequent breaches attack different associations and why, and possibly analyze how other methods that have been used previously have turned out which would allow them to devise strategies to either prevent breaches from occurring, or how to deal with breaches in a safe way after they have already occurred.
Click the navigation icon below to view other past works!