In the Cybersecurity field, the dynamics of technology, culture, and ethics intertwine to shape both opportunities and challenges. Cyber technology presents avenues for criminal behavior through its interconnected networks. Cultural beliefs influence cybersecurity strategies, impacting how societies perceive privacy and security measures. As a student, engaging in assignments related to cybersecurity has been invaluable in…
Final Essay:
Final essay
SCADA Write Up:
200T write up #2
CIA Triad Write-up:
https://docs.google.com/document/d/1iMoFSM3JGQuT0q635AjT-YXScPASm62y8Wgk2362g60/edit?usp=sharing
DISCUSSION BOARD Protecting Availability:
In this discussion board, you are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)? The first protection I would implement to ensure the availability of my systems is load balancing. load balancing techniques distribute incoming network traffic across multiple servers. This helps prevent any…
Discussion BoardĀ Opportunities for Workplace Deviance:
How has cyber technology created opportunities for workplace deviance? Due to cyber technology offering security and remote access, it has created opportunities for employees to participate in activities such as personal internet use and online abuse. Furthermore, the complexity of cyber systems presents opportunities for data theft, sabotage, and illegal access, seriously endangering the security…
Through diligent effort and a passion for learning, my journey in cybersecurity class has been nothing short of transformative. Starting from a place of little to no understanding, I have evolved into a knowledgeable individual with a deep comprehension of cybersecurity principles, techniques, and best practices. This journey showcases not only my personal growth but…