Cybersecurity and Digital Forensics 2025

Category CYSE 200T Discussions

Use Technology & Responsibility: Reflections on the New Tasks of Ethics to answer this question. Discuss the ethical aspects to the growth of technology. Do you agree with the writer? What thoughts in your own life does this paper bring up?

This author views technology as evil. He believes technology is a threat that we are associating ourselves with. It was believed at one point that technology was a goal or striving point for progress, but now we are hidden behind technology. Jonas… Continue Reading →

Using what we have looked at with the Cyber Stalking and Cyber Harassment. Discuss a view on it. One view could be: How have the changes in technology affected the definitions of appropriate and inappropriate behavior?

Technology in a sense has become a crutch. Many people believe and appear to be more confident behind a screen. Bullying in school is still very sadly common, but that then translates online. Social media has made it so that… Continue Reading →

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

Cybercrimes and the criminal justice system do encounter each other. Many believe that due to cybercrimes being committed on the internet or through a computer, it is not punishable in court or do not apply to a court system. This… Continue Reading →

Discuss the need for and vulnerabilities associated with SCADA systems.

SCADA stands for Supervisory Control and Data Acquisition, and it is used to control, monitor, and record events of systems. This system is very useful, especially for many industrial organizations. It allows people to access the logs and records recorded… Continue Reading →

Discuss the impact of cyber technology on engineering systems.

Since the popularity of cybersecurity has increased so has the threat to many engineering technology systems. Not only can this apply to surveillance systems, operating systems, or banking. Cyber attacks can affect factories for example. One incident of this is… Continue Reading →

How can cryptography help us with authenticity and integrity?

The reason for cryptography is to securely send messages and to make sure the message sent is what the receiver is getting using math and technology combined. It can involve encrypting plaintext into ciphertext and sending it and then the… Continue Reading →

Part 1: Select and describe 2 key trends in Identity Management. First, look at demographic differences, then examine geographical differences between the US and other global regions. Part 2: What is FIDO and what problems does this organization address?

Part 1: Based on the reading alone by IBM millennials ages 20-36 seem to have less concern for password safety than those 55 years and up. Many millennials prefer convenience over security based on the survey given. It seems the… Continue Reading →

Using both the NSF article “The Impact of Cyber Security on Small Businesses, and the NIST publication “Small Business Information Security: The fundamentals, as a basis, examine & discuss the costs and benefits of developing cyber security programs in small businesses, starting with understanding where to start. By their very nature, small businesses have limited funds to spend on cyber security related activities. So, start with how would you determine where and how to spend these limited dollars.

To start off figuring out how to spend the money in a business, I believe best practice would examine all of the protections needed based on inventory. Certain protections do not need to be purchased if that type of product… Continue Reading →

Use the article “The State of Industrial Cybersecurity 2017 to assist in your answer.

Provide your understanding of this report on Industrial Cybersecurity. Also, what are the impacts of a security breach on a company? Are organizations prepared for this type of threat? According to the article from my perspective, companies overall underestimate the damage or… Continue Reading →

Use Electric Grid Security and Resilience as well any other source to assist in answering (be sure to cite your source).

The Information Systems Audit and Control Association (ISACA) identifies the following types of malicious cyber-related activities: Pick one or several of these areas of cyber threats and discuss. Intellectual property threat can be a type of malicious attack in many… Continue Reading →

Use Bourgeois: Chapter 6, Information Systems Security to assist in answering.

Just what is a framework and why can it be useful?  Briefly describe the 5 core activities of NIST’s Cybersecurity framework.

A framework is a structure you can build upon whether actual or conceptual. A framework is a starting point to assist in development to guide and make the process speed up to best reach the goals. It is also a… Continue Reading →

© 2025 Jasmyn Wilhelm — Powered by WordPress

Theme by Anders NorenUp ↑