This essay reflects on all of my skills and supporting artifacts, and how they can most effectively be applied to a successful career in cybersecurity.
Author: ktayl088
Digital Forensics TedX
Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. While watching Davin’s video, I think it is very interesting that he chose…
CYSE-200T The Human Factor in Cybersecurity Write-up
In this write-up, we discuss how I would balance a budget as Chief Information Security Officer for a company. There are two investments that need to be balanced, training and cybersecurity technology.Training InvestmentsEffective user training is essential when it comes to cybersecurity posture. This can include phishing training, user awareness training, and cybersecurity policy training….
CYSE-200T The CIA Triad, Authorization Vs. Authentication Write-up
The CIA triad is an information security model that stands for “Confidentiality, integrity and availability.” It is a standard that is used among several organizations to maintain the three standards of the CIA triad. CIA Triad Broken Down All three of these aspects are designed to maintain the three most important principles to information security….
CYSE-200T The SCADA Systems Write-Up
In this write-up, we discuss SCADA systems. We define what they are, the security. vulnerabilities they have, and how they can best be mitigated. We will also discuss the importance of these systems and provide examples of them.What is SCADA? SCADA stands for “supervisory control and data acquisition”, they can be understood as what controls…
11 Illegal Things Internet Users Unknowingly Do
Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. The eleven things internet users do that may be illegal are described below. 1. Using unofficial streaming services 2….
Bug Bounty Summary Reaction
Read this article, https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings. The use of these policies is beneficial to several organizations, especially smaller-grade ones. These bug bounty policies address the current shortage of cyber security professionals…
Economics & Social Theories in a Breach
Read this sample breach letter and describe how two different economics theories and two different social sciences theories relate to the letter. After reading this case study, I believe that the rational choice economic theory could apply to this case study. This is due to the fact that it would be in the company’s best…
Cyber Security Analyst & Social Behaviors
After watching this video, https://www.youtube.com/watch?v=iYtmuHbhmS0 think about how the description of the cybersecurity analyst job relates to social behaviors. One of the ways that the description of the cybersecurity analyst job relates to social behaviors is the responsibility of providing user awareness. This type of training is not a technical problem, rather it encompasses the…
Social Cybersecurity Article Response
Read this and write a journal entry summarizing your response to the article on social cybersecurityhttps://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/ This article describes how social cybersecurity is becoming an increasingly important piece in cybersecurity. Hacking or manipulating other humans is a powerful tool that has been utilized by hackers for years. When you begin to look at cybersecurity through…