Jasmyn Wilhelm

Cybersecurity and Digital Forensics 2025

Page 5 of 8

Journal #1: Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.

One specialty that appeals to me most is digital forensics. This area intrigues me due to collecting the evidence after the attack and maintaining/preserving this for the officials to assist in the investigation. Looking into what can be found left… Continue Reading →

Use Technology & Responsibility: Reflections on the New Tasks of Ethics to answer this question. Discuss the ethical aspects to the growth of technology. Do you agree with the writer? What thoughts in your own life does this paper bring up?

This author views technology as evil. He believes technology is a threat that we are associating ourselves with. It was believed at one point that technology was a goal or striving point for progress, but now we are hidden behind technology. Jonas… Continue Reading →

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

Technology is constantly changing every day just like the world is constantly evolving. The meaning behind the “short arm of predictive knowledge” is that instead of looking way down the road one should focus on what is in front of… Continue Reading →

Using what we have looked at with the Cyber Stalking and Cyber Harassment. Discuss a view on it. One view could be: How have the changes in technology affected the definitions of appropriate and inappropriate behavior?

Technology in a sense has become a crutch. Many people believe and appear to be more confident behind a screen. Bullying in school is still very sadly common, but that then translates online. Social media has made it so that… Continue Reading →

What avenues should an aspiring information security professional use in acquiring professional credentials?  Cite resources and references that back up your recommendations.

If you look at most job requirements for a cybersecurity position the main ones listed are Security +, Certified Ethical Hacking, Certified Information Systems Auditor, etc. Coursera also offers many cybersecurity certificates that people have stated have helped their endeavors…. Continue Reading →

The Health Insurance Portability and Accountability Act (HIPAA) Security Rule establishes a national set of minimum security standards for protecting all electronic private health information (ePHI) that a Covered Entity (CE) and Business Associate (BA) create, receive, maintain, or transmit. The Security Rule contains the administrative, physical, and technical safeguards that CEs and BAs must put in place to secure ePHI. With that in mind, what types of information system components need to be heavily scrutinized to help protect the confidentiality and integrity of ePHI?  What types of controls would you recommend implementing to safeguard ePHI?  Cite resources and references that back up your assertions.

Things to consider when deciding what safeguards to use vary depending on the organization’s size or capabilities, the technical infrastructure, cost, and risk factors. Administrative, physical, and technical safeguards are recommended to protect ePHI. Administrative safeguards can include ensuring security… Continue Reading →

How does cyber technology impact interactions between offenders and victims?

Technology has limited the interactions victims experience with their offenders. A robbery can bestealing company information or files without leaving their home. While the name staysthe same, the description and actions are not. The actions are still illegal such as… Continue Reading →

The NIST CSF was developed to provide “a common language to address and manage cybersecurity risk in a cost-effective way based on business needs without placing additional regulatory requirements on businesses.” Do businesses and government agencies need to utilize such a framework to maintain a proper cybersecurity posture?  Can an organization mitigate cybersecurity risks without incorporating such a framework? Cite resources and references that back up your assertions.

Cybersecurity framework is not required for all organizations or sectors. All federal organizations are required to use the framework, but only some state companies such as insurance ones are mandated to. The framework is just that, a frame or guide,… Continue Reading →

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

Cybercrimes and the criminal justice system do encounter each other. Many believe that due to cybercrimes being committed on the internet or through a computer, it is not punishable in court or do not apply to a court system. This… Continue Reading →

Discuss the need for and vulnerabilities associated with SCADA systems.

SCADA stands for Supervisory Control and Data Acquisition, and it is used to control, monitor, and record events of systems. This system is very useful, especially for many industrial organizations. It allows people to access the logs and records recorded… Continue Reading →

Discuss the impact of cyber technology on engineering systems.

Since the popularity of cybersecurity has increased so has the threat to many engineering technology systems. Not only can this apply to surveillance systems, operating systems, or banking. Cyber attacks can affect factories for example. One incident of this is… Continue Reading →

How can cryptography help us with authenticity and integrity?

The reason for cryptography is to securely send messages and to make sure the message sent is what the receiver is getting using math and technology combined. It can involve encrypting plaintext into ciphertext and sending it and then the… Continue Reading →

Part 1: Select and describe 2 key trends in Identity Management. First, look at demographic differences, then examine geographical differences between the US and other global regions. Part 2: What is FIDO and what problems does this organization address?

Part 1: Based on the reading alone by IBM millennials ages 20-36 seem to have less concern for password safety than those 55 years and up. Many millennials prefer convenience over security based on the survey given. It seems the… Continue Reading →

Using both the NSF article “The Impact of Cyber Security on Small Businesses, and the NIST publication “Small Business Information Security: The fundamentals, as a basis, examine & discuss the costs and benefits of developing cyber security programs in small businesses, starting with understanding where to start. By their very nature, small businesses have limited funds to spend on cyber security related activities. So, start with how would you determine where and how to spend these limited dollars.

To start off figuring out how to spend the money in a business, I believe best practice would examine all of the protections needed based on inventory. Certain protections do not need to be purchased if that type of product… Continue Reading →

Use the article “The State of Industrial Cybersecurity 2017 to assist in your answer.

Provide your understanding of this report on Industrial Cybersecurity. Also, what are the impacts of a security breach on a company? Are organizations prepared for this type of threat? According to the article from my perspective, companies overall underestimate the damage or… Continue Reading →

« Older posts Newer posts »

© 2025 Jasmyn Wilhelm — Powered by WordPress

Theme by Anders NorenUp ↑