Cybersecurity and Digital Forensics 2025

Category CYSE 300 Discussions

What avenues should an aspiring information security professional use in acquiring professional credentials?  Cite resources and references that back up your recommendations.

If you look at most job requirements for a cybersecurity position the main ones listed are Security +, Certified Ethical Hacking, Certified Information Systems Auditor, etc. Coursera also offers many cybersecurity certificates that people have stated have helped their endeavors…. Continue Reading →

The Health Insurance Portability and Accountability Act (HIPAA) Security Rule establishes a national set of minimum security standards for protecting all electronic private health information (ePHI) that a Covered Entity (CE) and Business Associate (BA) create, receive, maintain, or transmit. The Security Rule contains the administrative, physical, and technical safeguards that CEs and BAs must put in place to secure ePHI. With that in mind, what types of information system components need to be heavily scrutinized to help protect the confidentiality and integrity of ePHI?  What types of controls would you recommend implementing to safeguard ePHI?  Cite resources and references that back up your assertions.

Things to consider when deciding what safeguards to use vary depending on the organization’s size or capabilities, the technical infrastructure, cost, and risk factors. Administrative, physical, and technical safeguards are recommended to protect ePHI. Administrative safeguards can include ensuring security… Continue Reading →

The NIST CSF was developed to provide “a common language to address and manage cybersecurity risk in a cost-effective way based on business needs without placing additional regulatory requirements on businesses.” Do businesses and government agencies need to utilize such a framework to maintain a proper cybersecurity posture?  Can an organization mitigate cybersecurity risks without incorporating such a framework? Cite resources and references that back up your assertions.

Cybersecurity framework is not required for all organizations or sectors. All federal organizations are required to use the framework, but only some state companies such as insurance ones are mandated to. The framework is just that, a frame or guide,… Continue Reading →

Describe some actions or techniques that can be used to mitigate or stop the impacts of malicious applications.  Are some of these methods more effective than others?  Provide an example of a cyber attack that resulted from the execution of malicious code.  There are plenty of examples that can be queried from the Internet.

There are many different ways a malware attack could be prevented. Such as filtering out packets you are not expecting just as if it were regular mail. By doing this you are not getting junk or putting the computer at… Continue Reading →

Internet Protocol Version 6 (IPv6) was designed to address the limitations of Version 4 (IPv4).  What cybersecurity-related enhancements have been incorporated into IPv6?  The adoption of IPv6 has been pretty slow across both the public and private sectors.  What reasons can you attribute to this?  Cite resources and references that support your assertions.

The most noticeable difference between IPv4 and IPv6 is that IPv4 uses a 32-bit address and IPv6 uses a 128-bit address. While there may not be a speed-related difference IPv6 has more qualities such as a built-in network security layer…. Continue Reading →

PKI is used extensively in the U.S. federal government. However, it has not caught on in the business and commercial sectors.  Why is this the case?  In your opinion, what is the future of PKI?  Do alternate methods such as those proposed by the FIDO Alliance (URL: https://fidoalliance.orgLinks to an external site.) offer a viable alternative to PKI?

PKI or Public Key Infrastructure is one of the most common forms of encryption and manages public key encryptions. PKI is used in the government, but not in business sectors due to the requirements to manage the certificates. Without proper… Continue Reading →

What is the best value that should be assessed when evaluating the worth of an information asset to the organization – replacement cost or lost income while repairing or replacing?  What is the likelihood value of a vulnerability that no longer requires consideration? Cite resources and references that can support your assertions.

The best value to a company can vary. I believe each product or system has its own set of benefits. One system is popular to buy and therefore lost income would hurt the company as the time to fix or… Continue Reading →

System monitoring and the use of network traffic log files are extremely important for gauging baseline performance and observing events.  Why does identifying abnormal behavior first require having a baseline?  What can a log file show that lends insight into abnormal behavior?

Establishing a baseline is essential for understanding how the normal flow of business will show on a report. You cannot know what is abnormal without first defining what normal is. Observing traffic for one day is not sufficient data, but… Continue Reading →

Imagine you are a manager responsible for implementing a significant cybersecurity-related technology change within an organization. What are the potential reactions to this change?  Indicate one way in which you would minimize the impact of adverse reactions within the change management process. Provide support for your recommendation.

The best way to minimize a bad reaction to a lot of change is to teach about the benefits. Harvard Business Review lists 3 things people consider most when change is involved. Difficulty is vital as people would like to know how… Continue Reading →

What are the benefits and risks of the use of SSO?  Specify measures that can be taken to better secure an SSO system.

One of the benefits of SSO is the less use of typing in the same username and passwords on multiple sites or applications. It can limit the number of issues related to password lockouts which reduces the workload of help… Continue Reading →

The decision to escalate incidents to law enforcement is an area fraught with conflict. In your opinion, what are the pros and cons of law enforcement involvement?  What resources and references can you cite to back up your assertions?

If law enforcement is not involved in the process of reporting cybercrime then why put our trust in companies? The debate starts as panic can spread when people find that a massive breach has occurred and information is at risk,… Continue Reading →

What is the difference between a threat and an attack?  How do exploits relate to vulnerabilities?  Is there an ethically acceptable reason to study and use the various attack methods described in this module?

A threat can be defined as an interpretation or words that convey a vulnerability and a plan to act on it. An attack is an actual attempt to exploit that vulnerability. A threat can be defined as a risk of… Continue Reading →

In your opinion, what are the biggest IoT security risks and challenges?  Cite resources and references that back up your assertions.

I would say the biggest risk of IoT is the lack of secure communications and data storage.  ITNS Consulting posted an article explaining the 5 biggest threats relating to IoT. One of the items listed is communications. In the article,… Continue Reading →

What is the defining difference between computer security and information security?  Why can we argue that information security is really an application of social science?

I believe the main difference between computer security and information security is a matter of what is being protected. Cybersecurity focuses on the technical aspect of data stored in a cloud, on a server, or over a network, etc. Cybersecurity… Continue Reading →

© 2025 Jasmyn Wilhelm — Powered by WordPress

Theme by Anders NorenUp ↑