I am excited to share my journey in the field of cybersecurity. During the Fall 2024 semester, I had the privilege of learning from Professor Kirkpatrick in CYSE 200. His engaging teaching style and in-depth expertise helped deepen my understanding of the fundamental principles of cybersecurity, igniting a strong passion for this dynamic and critical field. Through this course, I gained valuable insights into topics like “network security, risk assessment, or incident response techniques, and I developed hands-on skills that I am eager to apply in real-world scenarios. This experience has reinforced my commitment to pursuing excellence in cybersecurity, and I’m excited to continue building on the foundation laid during my time in CYSE 200.

This assignment explores the security challenges and solutions for Supervisory Control and Data Acquisition (SCADA) systems, which are critical to managing infrastructure like energy, water treatment, and transportation. It outlines the role of SCADA systems, describes their components, and identifies vulnerabilities stemming from increased connectivity and outdated technology. The write-up emphasizes modern security practices, such as network segmentation, real-time monitoring, and compliance with cybersecurity standards). These strategies aim to mitigate risks, protect against cyber threats, and ensure the resilience and reliability of critical infrastructure in an increasingly interconnected world.

https://1drv.ms/w/s!Atwow9FearxdhxJJqfLx85qFtSc7?e=8fVouS

This assignment examines the balance between technology investments and employee training in creating a robust cybersecurity framework. It emphasizes the need for strategic allocation of limited resources to maximize security effectiveness. The write-up advocates dedicating 60% of the budget to advanced technologies, such as Endpoint Detection and Response (EDR) and Intrusion Prevention Systems (IPS), which provide automated defenses and scale to counter external threats efficiently.

https://1drv.ms/w/s!Atwow9FearxdhxB5rpjO-qFwmPtM?e=axfIou

This assignment explores the foundational concepts of the CIA Triad—Confidentiality, Integrity, and Availability—and distinguishes between authentication and authorization in the context of information security.

https://1drv.ms/w/s!Atwow9Fearxdhw5C7usi_XIdFgix?e=vvrMji