Journal Entry 2

1. What is design thinking? Design thinking was created by two individuals at Stanford University: David Kelly and Tim Brown. This process offers a novel approach to problem-solving, incorporating fresh perspectives that were previously non-existent. Design thinking is widely embraced due to its emphasis on user-centric solutions and the generation of new possibilities. To practice…

Journal Entry 1

1. Am I an entrepreneur?According to the Oxford Dictionary, an entrepreneur “organizes and operates a business or businesses.” This is not exclusive to individuals with specific economic or social statuses. Anyone can become an entrepreneur with the right mindset and guidance. Pursuing a business idea is what defines someone as an entrepreneur. Many activities that…

Fake Websites

There are countless statistics suggesting that fake websites are becoming a growing issue. It has been estimated around twenty thousand are created daily to target individuals. The biggest issue arises when they look completely legitimate and users fall for it. With the use of AI, it is extremely easy to replicate a popular website that…

Principles of Science and how they Relate to Cyber Security

The fundamentals of science can be applied to all known things. For example, the very basic scientific method can be applied to all testable variations in experiments. This is even more of the case because in the digital age we do not need to physically conduct these experiments ourselves. We have simulations which do not…

Interests in the NICE Frame Work

The NICE framework is made up of different areas in cybersecurity and they are the following identify, protect, detect, respond, and recover. These all have important roles they accomplish but when they are all paired with one another they create a design that many companies and businesses need to strive for. It is a system…

Final ePortfolio

NIST Cyber Security Framework It is unrealistic to try to protect every piece of information in a business because there is so much. Instead to figure out what is most important than start from there. First thing I would do as a CISO for public traded company is ask the employees to create a list…