In order to reflect the work you have done in IDS 493 using your Cybersecurity ePortfolio, you will need to incorporate the following content.
Skills
Integrating Research into Cybersecurity and Interdisciplinarity
In my academic and professional journey toward a career in cybersecurity, I have relied on a variety of sources and interdisciplinary approaches to build a robust understanding of the field. Cybersecurity is inherently interdisciplinary, requiring knowledge from computer science, behavioral psychology, ethics, and even legal studies to address challenges like hacking, encryption, and user protection. Below are key research areas and sources that have shaped my perspective:
- Encryption and Cryptography
Encryption is fundamental to cybersecurity, and my work on Python scripts like encrypt.py and decrypt.py reflects this. These projects introduced me to classical and modern cryptographic methods, emphasizing the importance of mathematical algorithms and computational efficiency. Sources like Bruce Schneier’s Applied Cryptography offer detailed explanations of cryptographic protocols, while NIST’s guidelines help frame practical applications. - Ethical Hacking and Threat Analysis
Cybersecurity roles often demand proactive measures to assess vulnerabilities. Ethical hacking is a vital part of this, combining technical skills with an ethical framework. My exploration of hacking, cracking, and DDoS attacks ties into these concepts. Works such as The Web Application Hacker’s Handbook provide insights into exploiting and protecting web-based applications. - Socket Programming and Secure Communication
In a recent project for CYSE 250, I developed a socket-based Python application incorporating encryption and user authentication. This effort highlights the interdisciplinary nature of secure communication, blending networking principles with encryption algorithms. Texts like Kurose and Ross’s Computer Networking: A Top-Down Approach support understanding the layers of secure data transmission. - Behavioral and Psychological Dimensions
Cybersecurity isn’t just about technology it’s about people. Social engineering remains one of the most significant attack vectors. Research in psychology, such as Cialdini’s Influence: The Psychology of Persuasion, informs strategies to mitigate human-related vulnerabilities. - E-Portfolios and Integration
My work on e-portfolios for IDS 300W highlighted their role in integrating academic and professional experiences. By reflecting on personal growth and interdisciplinary connections, I’ve been able to tie my technical skills in cybersecurity to broader contexts like teamwork and communication. E-portfolios allow students to showcase their learning across diverse fields. - Cybersecurity Education and Policy
As I explored cryptographic protocols and key management, NIST’s publications and research from the National Cybersecurity Center of Excellence (NCCoE) became essential. They provide frameworks for implementing and managing secure systems in a rapidly changing threat landscape. - Interdisciplinary Problem-Solving
My personal narrative on experiential learning emphasizes problem-solving through experience. For instance, practical tasks like implementing algorithms for population growth or file management required synthesizing mathematics, programming, and real-world applicability. Such interdisciplinary projects prepare me for cybersecurity scenarios that demand cross-disciplinary thinking. - Ethics and Responsibility in Cybersecurity
Addressing ethical concerns is a recurring theme in my education. Cybersecurity professionals must balance data privacy with security measures. Ethical theories, such as Kantian ethics and utilitarianism, provide a framework for making difficult decisions, supported by works like Tavani’s Ethics and Technology.
Each of these areas contributes to my understanding of cybersecurity as an interdisciplinary field. By weaving together technical skills, ethical principles, and experiential learning, I am preparing for a career that not only defends against cyber threats but also considers the broader societal implications of digital security.
Reflections:
Paper 1: Job Postings
Job-posting-paper-1Paper 2: Narrative
new-1Paper 3: Application of Disciplines
3-1