Internship Journal #3

Marshall Brown Dr. Saltuk Karahan CYSE 368 June 24th, 2023               As I started my sixth week at Custom Truck One Source, I was getting in the groove of things. I would go to work having a task ready at hand. Whether that be updating user attributes in Active Directory, finishing up analyzing an Excel…

Internship Journal #2

Marshall Brown Dr. Saltuk Karahan CYSE 368 June 14th, 2023               As I started my third week at Custom Truck One Source, I was feeling very comfortable and happy to come to work. They have me doing a lot more in-depth work now since I am getting the hang of all the controls and programs…

Internship Journal #1

Marshall Brown Dr. Saltuk Karahan CYSE 368 June 2nd, 2023             I started my internship with Custom Truck One Source on May 8th, 2023, as an IT Intern. My goals for this summer are to learn as much valuable information as possible whether it’s mainly about cyber security or just valuable information about life. Whatever…

CYSE 201S Article 2 Review

The article, “The Nature of Losses from Cyber-Related Events: Risk Categories and Business Sectors,” explores the different types of losses incurred by businesses due to cyber-related events, such as cyber-attacks, data breaches, and cyber espionage. The study provides insights into the specific risk categories and business sectors that are most vulnerable to such events and…

CYSE 200T How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge?

DISCUSSION BOARD The development of cyber-policy and infrastructure must be approached with a recognition of the “short arm” of predictive knowledge. This means that we cannot predict all the potential threats and risks in cyberspace. Therefore, we need to adopt a proactive and adaptive approach to cybersecurity. One approach is to adopt a risk management…

CYSE 201S Career Paper

The role of social science research in cybersecurity is becoming increasingly important as the field continues to grow and evolve. This paper focuses on the specific job of a security analyst and demonstrates how professionals in this career depend on social science research and principles in their daily routines. The paper discusses key concepts learned…

CYSE 200T The Human Factor in Cybersecurity

This essay outlines a Chief Information Security Officer’s approach to balancing cybersecurity training and technology with a limited budget. The approach includes conducting a comprehensive risk assessment, investing in cybersecurity training, implementing necessary technology, regularly updating and patching software, and continuous monitoring. By following these steps, CISOs can enhance their organization’s cybersecurity posture and protect…

CYSE 200T SCADA Systems

Critical infrastructure systems, such as power grids, water treatment plants, and transportation networks, are vulnerable to cyber-attacks. SCADA systems play a crucial role in mitigating these risks by monitoring and controlling industrial processes in real time. However, SCADA systems are also vulnerable to attacks and require security measures such as firewalls, intrusion detection systems, and…

CYSE 201S Article 1 Review

Have you ever wondered, what are the losses of a business when a cyber attack occurs? Or how do you better prepare yourself and others against phishing scams? Well, these two questions are also from two different reliable cybersecurity journals found in “The Journal of Cybersecurity.” These two journals go into depth and detail about…