Analytical Skills

Having sharp analytical skills is a critical skill in the cybersecurity world. These competencies help one identify and mitigate threats effectively by analyzing complex systems and data.

Artifact One: Case Study

This artifact represents a case analysis discussion analyzing my understanding and application of basic IP protection laws. For this paper, I was supposed to act like an entrepreneur intending to sell a product or service online/ in a digital space while protecting it from copycats. Understanding intellectual property is vital for project managers who use this information to ensure that the development, utilization, and commercialization of their project is conducted in a manner that protects the interests of the company and complies with the applicable laws. The artifact below is an example of the business I would launch and a description of how I would protect it from intellectual property theft.

I am launching a business called “TechGlo Innovations,” specializing in a revolutionary smart home device named “GloHub.” GloHub is an all-in-one smart hub that seamlessly connects and manages various home automation systems, offering convenience and energy efficiency to users. To safeguard my business, I would leverage intellectual property (IP) protections strategically. Firstly, I’d explore patenting the unique features and functionalities of GloHub to prevent competitors from replicating its innovative design. Secondly, I’d register “GloHub” as a trademark to protect the brand identity, ensuring that consumers associate this cutting-edge technology with my business. Additionally, I’d implement trade secrets by safeguarding the proprietary algorithms and software codes that power GloHub, securing a competitive edge. Considering state protections, I’d explore any applicable regulations or business entity registrations that might further enhance legal safeguards. By integrating these IP strategies, TechGlo Innovations can confidently bring GloHub to market, knowing its hard work and ingenuity are protected against potential copycats.

Artifact Two: Op-ed article

My first artifact is a newspaper op-ed article examining the social meaning and impact of cybersecurity-related technical systems for the CYSE 200T Cybersecurity techno-society course. In this paper, I studied and combined two discussion posts from the same course to create a cohesive paper that exemplified my stand and its justification. By completing this analytical paper, I gained new insight into how cybersecurity affects our daily lives and reflected on my future career in cybersecurity.

Cybersecurity refers to the protection of internet-connected systems from potential cyber-attacks. Typically, the protection measures are instigated to shield a system from theft of sensitive information, as well as thwarting any form of damage to the latter. Cybersecurity relates to broader aspects that are cut-across, such as firewalls, technologies related to assessments, intrusion detection, and Cryptography. According to White (2002), the practices put into place help guarantee the protection of systems from cyber-attacks that would disrupt, misdirect, or even access data that is unauthorized. The impacts on society and technology intersect on various fronts, and here is the analysis of the social meaning and impact of cybersecurity-related technical systems essay. It is true to say that societal and ethical issues precede the more technical aspects which in this case cybersecurity. Therefore, there is a great implication on the social meaning and impact that cybersecurity may have on the wider society and technology as a whole. According to He (2006), the information that is available to the public either in media or in any social forum about and cybersecurity informs greatly about their impact. Many times a lot of negative information about cybersecurity crimes is spread, primarily involving hacking, and worms that tend to cause a lot of damage to systems. As a precaution, the malevolent actions come as a result of the activity of offenders and this may go on to tamper with the infringing integrity hence creating distrust among users. Users may then decide to do without the systems totally; this is to have an upper hand outside the threatened system. The system thereby becomes almost valueless and therefore an obstruction to potential information sharing between users. The information may also translate into a behavioral change among users; this is with the awareness that there is a great risk posed on them by the systems. This information and communication of aspects that are very weighty concerning cybersecurity go along or greatly inform the technical stipulations and even prescriptions that regard the controls that are supposed to be put in place (Gordon, Loeb and Lucy, 2006). The technical aspects also cover the threats that regard the various risks that cybersecurity of a particular system is exposed to. In other words, it is not practical at all to understand the technical aspects without prior considerations to the wider societal notions, impacts, and meanings. Cybersecurity is just like the canopy of a system and if the latter was to be a platform of ethical concerns then a gap targeting the underlying societal meaning and technical implications may just go on to widen. According to Newman (2014), there is still an interdependency and implications on cybersecurity and systems that exist. Different technicalities that are employed and installed in different systems have a lot to do with or based on the existing system of technology at hand. In most cases, technology is necessarily the blueprint of the specifics of a given societal system. It is only pragmatic therefore to point out that almost all pillars of society are affected and based on cybersecurity, cyber benefit or even cyber partner. For instance, the systems found in various sectors or in various parts of the economy in that regard, the technical profile of such systems involved must be in relation to the prevailing society. This includes the interconnectedness that must be exhibited in all facets and pillars of society. This is supplemented with the aspects that regard the consumer system that entails interrelated systems. So as to inform the shared assumptions in some contexts, there are as well some techniques that give the constraints (Blyth, 2013). When coming up with the blueprint of a system that may serve a society, critical considerations on cyber frontiers must be inculcated, or else the whole system with a technical touch would almost be valueless. Therefore, when cyber virtues are outmoded, then the means that vital societal elements are as well exposed or wished away by the change in the societal dynamics. This means that the change in the stated procedures within technical systems necessarily has an effect on the societal and ethical aspects of cyber crimes and somehow they are very much in use (Newman, 2014). And that’s where FIDO, which stands for Fast IDentity Online comes into play. FIDO and Cryptography play crucial roles. FIDO is an alliance formed to address the challenges and vulnerabilities inherent in traditional authentication methods, such as passwords and PINs. Passwords have long been a fundamental part of online security, but they present numerous problems including ease of theft, difficulty in remembering complex strings, and vulnerability to phishing and brute-force attacks. The FIDO Alliance endeavors to replace passwords with more secure and user-friendly authentication methods. Their standards are based on public key cryptography, where a pair of cryptographic keys is used. One is a private key that remains on the user’s device, and the other is a public key stored on the server. This ensures that even if a hacker accesses the server, they cannot authenticate without the private key. The FIDO protocols support a variety of biometrics, such as fingerprints or facial recognition, and security tokens, thus offering enhanced security and convenience for the user. The primary problems that FIDO aims to address include the high incidence of data breaches and cyberattacks resulting from weak or compromised passwords. A significant proportion of security incidents in the digital realm can be attributed to stolen or poorly managed passwords. By eliminating the dependency on passwords, FIDO aims to curtail these security breaches. Furthermore, the organization addresses the issue of poor user experience often associated with cumbersome password management. Constantly needing to create, remember, and update passwords can be frustrating for users, often leading them to adopt insecure practices like reusing passwords across multiple platforms. FIDO’s approach simplifies the authentication process, making it more intuitive and less prone to error, thereby improving both security and user experience. In this way, FIDO plays a pivotal role in making online interactions safer and more efficient, benefiting both users and service providers. Cryptography plays a crucial role in ensuring the authenticity and integrity of digital communications and data. Authenticity refers to the assurance that the origin of a message or data is genuine, and cryptography achieves this by employing digital signatures. Digital signatures use public-key cryptographic algorithms to provide a way to verify the identity of the sender. When a person signs a document digitally, a special cryptographic key that is unique to the sender is used, which can be verified by anyone with access to the corresponding public key. This ensures that the message has indeed come from the purported sender and has not been forged or tampered with. In this way, cryptography serves as a vital tool for preventing impersonation and ensuring that communications are genuinely from the claimed sources, thereby establishing trust in digital interactions. In addition to authentication, cryptography is essential for maintaining the integrity of data. Integrity involves ensuring that data has not been altered in transit or while stored. Cryptographic techniques like hash functions are commonly employed to achieve this. A hash function takes input data and produces a fixed-size hash value in a way that even a small change in the input will result in a drastically different hash value. By comparing the hash value of the original data to the hash value of the received data, it is possible to determine whether any alterations have occurred. If the hash values match, it assures that the data has not been tampered with. Consequently, cryptography not only helps in identifying unauthorized changes but also in confirming that the information remains unchanged from its authentic state. This dual role of ensuring authenticity and integrity makes cryptography indispensable in the digital age, promoting secure and reliable exchanges of information. It still boils down on the less tangible outcomes that are associated with the cybersecurity scenarios. The identified latter technological and societal implications of cybercrimes have a direct paraphrase on the possible accesses and successful breach attacks on a system. It is very true to stipulate that the impact directly falls in the technical sphere. However much of the current specifications and oversights are being fronted without considerations to their wider implications, they have a great sway on the greater purposes of justice and fairness (Adams and Turk, 2005). Some of the oversights are very much technical that even they easily bypass the less technical persons. and Lawless, Cyberattacks are acknowledged even by existing legal gates of which do validate the closed-down procedures such as to warrant, also imply the pain house of justice is enlisted. According to He (2006), Anderson and Moore, (2006), another further societal implication of the stated scenario happens to be the development and causing of the evident security industry that may just be for sale purposes by those that are in intention to take advantage of the created avenues. As a matter of stating straightforwardly, the resultant scenario is a substandard security product that may as well guarantee substandard outcomes. According to Anderson, (2001), another outstanding implication occurs in the possible undermining of civic control. This results in those companies that volunteer to offer services to cyber control so as to guarantee antisocial behavior in relation to cybercrime behavior. In summary, a 2factor attempt to verify the real provenance and just out any cyber identity by doing so results in a hard piece of evidence. Since in a good number of the cases the parties that are involved in courts goes as tech disadvantaged, it is possible to have such imitators and but impersonators that can approach the courts and proceed with the cases undetected. It is indeed the only way out to have a case decided without gadgets that remotely sits around the said right locus. It is indeed a societal compromise with the front media. Mounted gadgets have never been overridden by their own front through the designs’ although we indeed possess a know-how and ways through which possibilities to that be achieved Parenti and Hayes 2016. At a close look, the prisons practiced under the law are indeed a hybrid set-up that fits computers. It is clear that it exists that removes net to the actual resource that nearly lacks even of developed countries (Maña 2012). Fine prints and default settings to devices and key- safes inform rents and importantly permission oriented prints are indeed good and far much compatible with the structural cells designed for prison doors (Kasper and Haller 2016).

References

Adams, A., & McCrindel, S. (2007). Fewer hospitalizations for diabetes among First Nations people. Canadian Journal of public health – Revue Canadienne de Sante Publique, 98(2), 87. Retrieved from http://ezproxy.liberty.edu/login?url=https://ezproxy.liberty.edu/login?url=https://search-proquestcom.ezproxy.liberty.edu/docview/ 222655265?accountid=12085

Anderson, R. (2001). “Why information security is hard. ” Retrieved fromhttp://www.cl.cam.ac.uk/~rja14/intro7.htmledreschi, P. and Jennings., N. R. (2016). The ECJ Bot Project: Advancing AI in the EU. Available atSSRN: https://ssrn.com/abstract=2835470 or DOI: http://dx.doi.org/10.2139/ssrn.2835470

Furnell, S. (2004). Cyber security: The role of the user. Computers & Security, 23(6), 509–512.https://doi.org/10.1016/S0167-4048(04)00700-5

Blyth, A. (2013). “Key Principles and Parameters of Cyber-Insurance. ” Procedia Technology, Volume 8, 204 – 213.

Artifact Three: Job ad Assignment

My last artifact for this skill is a job ad assignment I did for the IDS 493 Electronic Portfolio Project class. Through this assignment, I was able to identify marketable skills in the cybersecurity field and analyze how my competencies align with the job description of an advertisement for a position I am interested in.

The job market today is highly competitive, and securing a position that aligns with one’s skills and career aspirations requires a thorough understanding of job advertisements and the expectations they set forth. This essay will analyze a job advertisement for an IT Project Manager position at Johns Hopkins Health Plans (JHHP) in Hanover, MD. The analysis will focus on the company’s background, the purpose of the job, its main responsibilities, and the skills required. Additionally, the essay will discuss how my own skill set, developed through specific courses, aligns with the expectations of this role. By applying concepts from class readings, this essay aims to provide a comprehensive understanding of the job requirements and how they relate to my qualifications. Johns Hopkins Health Plans (JHHP) is a leader in provider-sponsored health plans and is part of the larger Johns Hopkins Medicine network. JHHP serves over 500,000 active members and operates in various lines of business, including Medicaid, Medicare, commercial, military health, health solutions, and venture investments. The company is known for its innovative, analytics-driven health programs that aim to improve quality and health outcomes for its members and the communities it serves. The IT Project Manager role at JHHP is crucial for managing IT-related projects within the constraints of scope, quality, time, and cost to meet specified requirements and ensure customer satisfaction. This position holds a managerial rank, explicitly stated in the category “Manager/Supervisor,” and is likely to require more career experience rather than purely academic qualifications. The ad highlights the requirement for “5+ years’ demonstrated experience in project management or management” and notes that “work experience may be substituted for a degree where appropriate.” This indicates a preference for practical, hands-on experience in the field over theoretical knowledge alone. Further validating this, the description emphasizes skills such as indirect management of project teams, preparation of Requests for Proposal, vendor selection, contract negotiation, and the ability to manage projects within larger political, economic, and social environments. JHHP signals a comprehensive requirement for both technical and soft skills. Strong project management expertise, leadership, adaptability, and an understanding of broader contexts are prioritized, reflecting the multi-dimensional capabilities essential for the role. These requirements align well with the soft skills discussed in class, emphasizing the critical intersection of technical acumen and interpersonal skills in achieving professional success. The soft skills implied by the ad’s structure reinforce the importance of leadership and team management. This includes comfort with indirect management and proactive communication, which aligns closely with soft skills such as effective communication, adaptability, and emotional intelligence which was also discussed in class readings. Moreover, the overall focus on managing complex dynamics and ensuring project satisfaction points to a need for strong problem-solving and critical thinking skills, further underscoring the importance of balancing technical proficiencies with interpersonal capabilities.The primary responsibilities of the IT Project Manager at JHHP include managing one or more IT-related projects, providing a single point of contact for those projects, and making decisions to effectively manage scope, quality, timeframes, and budget. The role also involves developing and maintaining systems for administrative feedback, monitoring and evaluating information, and making necessary adjustments to procedures and program implementation. Additionally, the IT Project Manager is responsible for developing and maintaining project documents, including scope documents, project plans, and communication plans.I am eager to apply for the position of IT Project Manager at Johns Hopkins Health Plans (JHHP) for several reasons. Primarily, the role aligns perfectly with my passion for transforming healthcare delivery and being part of an organization at the “forefront of change.” JHHP’s commitment to innovative and analytics-driven health programs excites me as I am keen to contribute to this impactful work. My degree in Cybersecurity and minor in Information Systems provides a strong foundation for this role. Courses such as Project Management, Systems Analysis and Design, and Network Security have equipped me with the specific knowledge and skills needed to excel in this position. For instance, in my Project Management course, I learned about managing projects within the constraints of scope, quality, time, and cost, directly aligning with the responsibilities of managing IT-related projects “within the constraints of scope quality, time and cost to deliver specified requirements and meet customer satisfaction.” Furthermore, my coursework in Systems Analysis and Design has trained me to effectively manage the scope, quality, timeframes, and budget of various projects, which is a critical aspect of the IT Project Manager position. I understand the importance of providing a single point of contact for projects to ensure clear communication and streamlined processes, ensuring customer satisfaction. Additionally, my experience in Network Security has made me adept at making necessary adjustments to procedures and program implementation, ensuring that projects remain productive and cost-effective. This background will allow me to participate seamlessly in cost-benefit analyses, vendor selection, contract negotiation, and implementation of new software. What attracts me most to JHHP is the opportunity to be part of a leader in provider-sponsored health plans. The chance to work remotely further emphasizes JHHP’s commitment to work-life balance, which is important to me as it ensures sustainability and productivity in my professional role. The additional benefits such as the employer contribution to the 403 B Savings Plan and the health and wellness programs also reflect an organization that values employee well-being, which is aligned with my professional values. I am confident my degree in Information Systems and Cybersecurity, combined with my practical coursework and substantial project management experience, positions me well to contribute effectively to JHHP. I am excited about the opportunity to drive improved quality and better health outcomes for JHHP members and the communities served. The job advertisement provides some insights into the company culture at JHHP. The emphasis on work-life balance, remote work, and comprehensive benefits, including medical, dental, and vision insurance, 403B savings plan, paid time off, and tuition assistance, suggests a company that values its employees’ well-being and professional development. The ad also highlights JHHP’s commitment to innovation and setting the pace for change within the healthcare industry, indicating a forward-thinking and dynamic work environment. The company’s culture aligns with my personal values and career aspirations. I am passionate about improving healthcare delivery and being at the forefront of change, which makes JHHP an ideal place for me to grow professionally. My background in healthcare, combined with my adaptability and proactive management skills, make me a good fit for the company’s culture and the IT Project Manager role. The company’s culture is also characterized by a strong value placed on diversity, equity, and inclusion, as evidenced by their status as an Equal Opportunity/Affirmative Action employer. The phrases “you belong here” and “setting the pace for change” reflect a welcoming environment that encourages contributions from a diverse workforce and promotes continuous improvement. To thrive in the JHHP culture, certain skills and personal qualities are essential. A strong background in project management, particularly in IT, aligns well with the role’s requirements. This includes proficiency in managing project constraints such as scope, quality, time, and budget while maintaining high customer satisfaction. The ability to navigate and adapt to various political, economic, and social environments shows an understanding of the complex landscape of healthcare. Comfort with indirect management and effective communication skills are also critical in ensuring project teams are aligned and motivated. And reflecting on my own narrative choices and life stories, my passion for healthcare and technology makes me a great fit for JHHP’s culture. I have always been driven by a desire to make a meaningful impact in the community, and improving healthcare delivery resonates deeply with my personal mission. Having worked in fast-paced environments where adaptability and quick, effective decision-making were necessary, I have developed a sense of resilience and a capacity for innovative thinking. Additionally, my experiences inBafunye 5technology and healthcare roles involved extensive collaboration, often requiring me to mediate between various beneficiaries to achieve the best outcomes; a crucial element in JHHP’s collaborative culture.Upon closely analyzing the ad for the IT Project Manager position at Johns Hopkins Health Plans, one soft skill that stands out as crucial yet unstated is *emotional intelligence*. Emotional intelligence involves the ability to understand and manage not only your emotions but also those of others. This skill is vital for several reasons based on the phrases and responsibilities outlined in the ad. Firstly, the phrase “be responsible for managing one or more IT related projects… to deliver specified requirements and meet customer satisfaction” implicitly suggests that the ability to manage and satisfy stakeholders is key. Successful project management often hinges on strong interpersonal relationships and understanding the nuanced needs and concerns of clients and team members. Emotional intelligence helps in navigating these relationships effectively. Thus, while the job ad doesn’t explicitly state the need for emotional intelligence, the underlying requirements and nature of the responsibilities make it clear that this soft skill is indispensable for the role. The IT Project Manager role at JHHP is likely to present several challenges, including managing multiple projects simultaneously, adapting to changing political, economic, and social environments, and ensuring effective communication and collaboration among project teams. However, the ad’s emphasis on work-life balance, comprehensive benefits, and the company’s commitment to innovation and employee well-being is encouraging. It suggests a supportive work environment that values its employees and provides the resources and support needed to overcome challenges and succeed in the role. In conclusion, the IT Project Manager position at Johns Hopkins Health Plans offers an exciting opportunity to be at the forefront of change in healthcare delivery. The job advertisement highlights the company’s commitment to innovation, employee well-being, and professional development. The role requires a combination of hard and soft skills, including project management experience, educational background, indirect management skills, vendor management, adaptability, and proactive management. My academic background has equipped me with the skills required for this role, and the company’s culture aligns with my personal values and career aspirations. The analysis of the job advertisement, combined with the application of class concepts, provides a comprehensive understanding of the position and its requirements, making me a strong candidate for the IT Project Manager role at JHHP.

References :Johns Hopkins Health Plans. (n.d.). IT project manager [Job listing]. Johns Hopkins Medicine.

Leave a Reply

Your email address will not be published. Required fields are marked *