System Security Policies

You have been asked to design a security policy for a corporate information system consisting of on-premises web, application, and database servers.  The database servers store very sensitive data that must be protected. Discuss five important issues that should be addressed in the security policy. Completing this assignment allowed me to understand the importance of…

Journal Entry #3

Review Maslow’s Hierrachy of Needs and explain how each level relates to your experiences with technology.  Give specific examples of how your digital experiences relate to each level of need.  Maslow’s Hierarchy of Needs when pertaining to technology today is a great example of how the world and society has changed into what it is…

Journal Entry #2

Explain how the principles of science relate to cybersecurity. The principles of science relate to cybersecurity beacuse in just about every situation there is a process behind the events caused that can be explained using the principles of science. When referring to relativism, this is the science of how all things can be realted. An…

Journal Entry #1

Review the NICE Workforce Framework.  Are there certain areas that you would want to focus your career on?  Explain which areas would appeal the most to you and which would appeal the least. The area that I want to focus my career on is overseeing and governing. Being able to create specific policies, rules, procedures…

Protecting Availability

You are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)?

NIST Cybersecurity Framework

What benefit can organizations gain from the NIST Cybersecurity Framework, and how would you use it at your future workplace?

SCADA Systems

This write-up discusses critical infrastructure vulnerabilities and how Supervisory Control and Data Acquisition  (SCADA) mitigates those risks

The Human Factor in Cybersecurity

This write-up discusses the benefits and obstacles of human interaction and additional technology regarding cybersecurity companies and organizations.