Introduction to Cybersecurity
CYSE 300 provided a foundational understanding of cybersecurity concepts and practices, focusing on the importance of securing information systems, recognizing cyber threats, and implementing protective measures. Key topics included cybersecurity frameworks, ethical hacking, and real-world case studies, which were explored through research and online labs. This course emphasized critical thinking and the application of cybersecurity principles to mitigate risks and improve system security.
1. Identical Thief
This paper explored the vulnerabilities and risks associated with identity theft. I analyzed real-world case studies to highlight how cybercriminals exploit personal data and the measures organizations and individuals can take to protect against such threats. The research emphasized the importance of proactive risk management and public awareness in minimizing identity theft incidents.
2. Key Security Policy
This paper focused on the implementation and enforcement of key security policies within organizations. I examined the role of access controls, encryption, and employee training in safeguarding sensitive information. The research emphasized the critical role of security policies in preventing breaches and ensuring compliance with industry standards.
3. Target Data Breach
This paper analyzed the infamous Target data breach, investigating the causes, consequences, and lessons learned from the incident. My research examined the failures in network security and third-party management that led to the breach and proposed strategies to prevent similar incidents in the future. This assignment reinforced my understanding of incident response and risk mitigation strategies in cybersecurity.
5. Hands-On Labs
While the labs were conducted online and required restricted access, they played a crucial role in applying theoretical knowledge. The labs covered essential skills such as:
• Configuring network security tools
• Detecting and mitigating simulated cyberattacks
• Analyzing vulnerabilities within virtualized environments