Discussion Prompts and Replies

Using the article 50 Cybersecurity Titles That Every Job Seeker Should Know About research two or more of these jobs that are of interest to you. What disciplines do you see represented in these 50 jobs? What skills are required for the two jobs you selected? What was your biggest surprise? I became interested in cybersecurity…

Cybersecurity’s Greatest Threat: Humans

People’s technological literacy has not scaled with the advancements in technology. With that in mind, it is up to industry leaders to acknowledge this and implement a strategy to bridge the gap rather than crutching on technological advancements which leaves people further behind. By not prioritizing the human factor, industry leaders perpetuate the risks to…

Career Paper – Pen Tester

Career Paper – Pen Tester The field of penetration testing within a red team is one that has always interested me. It is a challenging and constantly changing environment where testers are faced with a range of client challenges. A pen tester is essentially a gun-for-hire that specialize in validating an organizations security posture or…

Module 12 Journal

Read this and review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious? 1. Using Unofficial Streaming Services 2. Using Torrent Services 3. Using Copyrighted Images 4. Sharing Passwords/Addresses/Photos 5. Bullying and Trolling 6. Recording a VoIP Call Without Consent 7. Faking…

Discussion Posts/Opinions

Describe the top three careers of social science graduates that you would be interested in considering. What is it about those jobs that you find interesting? Politics, economy, and industrial-organizational psychologist are the three highest earning careers in regards to social science according to degreequery.com. Political science as a top earner makes the most sense…

Module 11 Journal A & B

Journal A: Case Study— Describe how two different economic theories and a Sample Data Breach Notification relate. https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf After reading the breach notification letter, the two economic theories that most closely relate to it are who knows. The letter seems pretty common. There were 4 theories in the slides provided, but after a quick google…

425W Discussion and Opinion

In your opinion, what is the top cybersecurity concern the world will face in the following decade? The obvious concerns, DDoS/Virus/Trojan/etc.., become more sophisticated but remain concerns none the less. However, I believe one of the the biggest concerns in the coming years is failure from the c-suite to “invest in sufficient cybersecurity.” Technology is…

Write Up 2:

Vulnerabilities of critical infrastructure and SCADA applications As cities continue to increase their reliance on technology to address aspects of their critical infrastructure there exist vulnerabilities for hackers to exploit. Critical infrastructure As the world increases its advancement with technology, so too are cities integration of technology to monitor and control its infrastructure. These technologically…

Write Up 1

A Summary of the CIA Triad, Authentication, and Authorization The CIA triad is the balance between confidentiality, integrity, and accessibility. It is the basis for how many organizations operate. Authentication is credentials that prove that you are who you say you are. Authorization is the level access that one has been granted. CIA Triad CIA…